fffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:02:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:02:48 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r2, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r3 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r3, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:02:48 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:02:48 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 706.434488] blktrace: Concurrent blktraces are not allowed on sg0 [ 706.435275] blktrace: Concurrent blktraces are not allowed on sg0 02:02:48 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:01 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:01 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:01 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:01 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:03:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:03:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 719.352824] blktrace: Concurrent blktraces are not allowed on sg0 [ 719.354075] blktrace: Concurrent blktraces are not allowed on sg0 02:03:01 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:01 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:01 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:01 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:03:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:14 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:14 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:03:14 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:14 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:14 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:14 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 732.434616] blktrace: Concurrent blktraces are not allowed on sg0 [ 732.435508] blktrace: Concurrent blktraces are not allowed on sg0 02:03:14 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:14 executing program 2: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 732.603918] blktrace: Concurrent blktraces are not allowed on sg0 02:03:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:03:14 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:14 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:03:14 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:03:14 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:28 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:28 executing program 2: mknodat$loop(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:03:28 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:28 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:28 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:28 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(0x0, &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 746.186113] blktrace: Concurrent blktraces are not allowed on sg0 02:03:28 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:28 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:28 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:41 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:41 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:03:41 executing program 2: mknodat$loop(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:41 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(0x0, &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:41 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:41 executing program 1: mknodat$loop(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 759.650242] blktrace: Concurrent blktraces are not allowed on sg0 02:03:41 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:41 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(0x0, &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 759.778178] blktrace: Concurrent blktraces are not allowed on sg0 02:03:42 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:42 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', 0x0) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:42 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:03:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:55 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:55 executing program 2: mknodat$loop(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:55 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:55 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:55 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:55 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', 0x0) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:55 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 773.478411] blktrace: Concurrent blktraces are not allowed on sg0 02:03:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:55 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', 0x0) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:03:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 773.595027] blktrace: Concurrent blktraces are not allowed on sg0 [ 773.598946] blktrace: Concurrent blktraces are not allowed on sg0 02:03:55 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:03:55 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:03:55 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:03:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:09 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:04:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:09 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:09 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:09 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 786.851043] blktrace: Concurrent blktraces are not allowed on sg0 [ 786.853001] blktrace: Concurrent blktraces are not allowed on sg0 [ 786.856194] blktrace: Concurrent blktraces are not allowed on sg0 02:04:09 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:09 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:04:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 787.065282] blktrace: Concurrent blktraces are not allowed on sg0 [ 787.067439] blktrace: Concurrent blktraces are not allowed on sg0 02:04:09 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:09 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:04:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:04:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 787.293333] blktrace: Concurrent blktraces are not allowed on sg0 [ 787.295008] blktrace: Concurrent blktraces are not allowed on sg0 02:04:22 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:22 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:04:22 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:22 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, 0x0, 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:04:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:04:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:22 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:22 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:23 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, 0x0, 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 800.720342] blktrace: Concurrent blktraces are not allowed on sg0 [ 800.721143] blktrace: Concurrent blktraces are not allowed on sg0 02:04:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) [ 800.934665] blktrace: Concurrent blktraces are not allowed on sg0 [ 800.936469] blktrace: Concurrent blktraces are not allowed on sg0 02:04:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:36 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:04:36 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, 0x0, 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:04:36 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:36 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:36 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 814.693263] blktrace: Concurrent blktraces are not allowed on sg0 [ 814.697065] blktrace: Concurrent blktraces are not allowed on sg0 02:04:37 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() [ 814.825651] blktrace: Concurrent blktraces are not allowed on sg0 02:04:37 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:49 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:04:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:49 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:04:49 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:04:49 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:49 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(0x0, &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:04:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:04:50 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:04:50 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:04:50 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(0x0, &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:03 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:03 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(0x0, &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:03 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:03 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:03 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:05:03 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:03 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:03 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 841.407358] blktrace: Concurrent blktraces are not allowed on sg0 02:05:03 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:16 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:16 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:16 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:16 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:16 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 854.611876] blktrace: Concurrent blktraces are not allowed on sg0 02:05:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:05:16 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:16 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:16 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 854.852736] blktrace: Concurrent blktraces are not allowed on sg0 02:05:17 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:30 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:30 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:30 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:30 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:30 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 867.953980] blktrace: Concurrent blktraces are not allowed on sg0 02:05:30 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:30 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:30 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:30 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:43 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:43 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:43 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:43 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 881.147907] blktrace: Concurrent blktraces are not allowed on sg0 02:05:43 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:43 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:43 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:57 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:57 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:05:57 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 895.047205] blktrace: Concurrent blktraces are not allowed on sg0 02:05:57 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:05:57 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:05:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:57 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:05:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:57 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:05:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:05:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:05:57 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:11 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:06:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:11 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:06:11 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:06:11 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:11 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:06:25 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:06:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:25 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:06:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:06:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:25 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:06:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 922.887599] blktrace: Concurrent blktraces are not allowed on sg0 [ 922.888747] blktrace: Concurrent blktraces are not allowed on sg0 02:06:25 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:25 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:06:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:06:25 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:06:25 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:06:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:25 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:06:25 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 923.088075] blktrace: Concurrent blktraces are not allowed on sg0 02:06:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:06:25 executing program 1: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:25 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:06:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:25 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:39 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:06:39 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:06:39 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:06:39 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:06:39 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:39 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:06:39 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:39 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:06:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:39 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:06:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:53 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:06:53 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:06:53 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:06:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:53 executing program 1: lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:53 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:06:53 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:06:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:06:53 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:06 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:07:06 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:06 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:07:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:07:06 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:07:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 964.530007] blktrace: Concurrent blktraces are not allowed on sg0 [ 964.531915] blktrace: Concurrent blktraces are not allowed on sg0 02:07:06 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:07:06 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:06 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:07:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:07:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:07 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:07:07 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:20 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:20 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:07:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:20 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:20 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:07:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:07:20 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.593414] blktrace: Concurrent blktraces are not allowed on sg0 02:07:20 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 978.638665] blktrace: Concurrent blktraces are not allowed on sg0 02:07:20 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:07:21 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:07:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:21 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 978.788146] blktrace: Concurrent blktraces are not allowed on sg0 [ 978.789104] blktrace: Concurrent blktraces are not allowed on sg0 02:07:21 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:07:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:07:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) [ 978.924139] blktrace: Concurrent blktraces are not allowed on sg0 02:07:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:07:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:07:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:34 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:34 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:07:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) [ 992.264093] blktrace: Concurrent blktraces are not allowed on sg0 [ 992.267632] blktrace: Concurrent blktraces are not allowed on sg0 [ 992.269400] blktrace: Concurrent blktraces are not allowed on sg0 02:07:34 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 992.312890] blktrace: Concurrent blktraces are not allowed on sg0 02:07:34 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:07:34 executing program 3: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:07:34 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:07:34 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 992.498769] blktrace: Concurrent blktraces are not allowed on sg0 02:07:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:07:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:07:47 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:07:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:07:47 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:07:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:07:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:07:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() [ 1005.597802] blktrace: Concurrent blktraces are not allowed on sg0 [ 1005.600801] blktrace: Concurrent blktraces are not allowed on sg0 [ 1005.602855] blktrace: Concurrent blktraces are not allowed on sg0 02:07:47 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:07:47 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) [ 1005.664851] blktrace: Concurrent blktraces are not allowed on sg0 02:07:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:08:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:01 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:08:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:01 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r4 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r4, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:01 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1019.269309] blktrace: Concurrent blktraces are not allowed on sg0 02:08:01 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:08:01 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1019.316987] blktrace: Concurrent blktraces are not allowed on sg0 [ 1019.318172] blktrace: Concurrent blktraces are not allowed on sg0 02:08:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) socket$inet6_udplite(0xa, 0x2, 0x88) 02:08:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:01 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1019.477876] blktrace: Concurrent blktraces are not allowed on sg0 02:08:01 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:01 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1019.534130] blktrace: Concurrent blktraces are not allowed on sg0 [ 1019.535561] blktrace: Concurrent blktraces are not allowed on sg0 [ 1019.536257] blktrace: Concurrent blktraces are not allowed on sg0 02:08:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) 02:08:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1019.625028] blktrace: Concurrent blktraces are not allowed on sg0 02:08:01 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:15 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:15 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:08:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:15 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:08:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1033.123290] blktrace: Concurrent blktraces are not allowed on sg0 [ 1033.126034] blktrace: Concurrent blktraces are not allowed on sg0 [ 1033.127883] blktrace: Concurrent blktraces are not allowed on sg0 02:08:15 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:08:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) [ 1033.209350] blktrace: Concurrent blktraces are not allowed on sg0 02:08:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:28 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) 02:08:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:28 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:08:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1046.113317] blktrace: Concurrent blktraces are not allowed on sg0 [ 1046.160806] blktrace: Concurrent blktraces are not allowed on sg0 [ 1046.162556] blktrace: Concurrent blktraces are not allowed on sg0 [ 1046.163856] blktrace: Concurrent blktraces are not allowed on sg0 02:08:28 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) 02:08:28 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:28 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1046.260570] blktrace: Concurrent blktraces are not allowed on sg0 02:08:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:08:28 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1046.353545] blktrace: Concurrent blktraces are not allowed on sg0 02:08:28 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1046.427049] blktrace: Concurrent blktraces are not allowed on sg0 02:08:42 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:08:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:08:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:42 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:42 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:42 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1059.887238] blktrace: Concurrent blktraces are not allowed on sg0 02:08:42 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) [ 1059.888150] blktrace: Concurrent blktraces are not allowed on sg0 02:08:42 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:42 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e6574", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:08:42 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:08:42 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) 02:08:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:42 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) 02:08:42 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e6574", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r3 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r3, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:08:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:08:55 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) 02:08:55 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e6574", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:08:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1073.028267] perf: interrupt took too long (101105 > 7973), lowering kernel.perf_event_max_sample_rate to 1000 [ 1073.031772] blktrace: Concurrent blktraces are not allowed on sg0 [ 1073.032503] blktrace: Concurrent blktraces are not allowed on sg0 02:08:55 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) 02:08:55 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e65746465", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1073.065062] blktrace: Concurrent blktraces are not allowed on sg0 02:09:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:08 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) 02:09:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:08 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e65746465", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:08 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:09:08 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:09:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:09:08 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, 0x0) 02:09:08 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:08 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e65746465", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1086.380239] blktrace: Concurrent blktraces are not allowed on sg0 [ 1086.382568] blktrace: Concurrent blktraces are not allowed on sg0 02:09:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:09:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:08 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e6574646576", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1086.549485] blktrace: Concurrent blktraces are not allowed on sg0 02:09:08 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:09:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:08 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r1, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1086.653670] blktrace: Concurrent blktraces are not allowed on sg0 02:09:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:22 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:09:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:09:22 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r1, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:22 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e6574646576", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:22 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1100.390954] blktrace: Concurrent blktraces are not allowed on sg0 [ 1100.391669] blktrace: Concurrent blktraces are not allowed on sg0 [ 1100.392378] blktrace: Concurrent blktraces are not allowed on sg0 02:09:22 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e6574646576", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:09:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r4 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r4, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:22 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:09:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1100.502345] blktrace: Concurrent blktraces are not allowed on sg0 02:09:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() [ 1100.562570] blktrace: Concurrent blktraces are not allowed on sg0 02:09:22 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:09:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r4 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r4, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1114.186673] blktrace: Concurrent blktraces are not allowed on sg0 02:09:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:09:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:09:36 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:36 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:09:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1114.229508] blktrace: Concurrent blktraces are not allowed on sg0 [ 1114.230230] blktrace: Concurrent blktraces are not allowed on sg0 02:09:36 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1114.253240] blktrace: Concurrent blktraces are not allowed on sg0 [ 1114.270676] blktrace: Concurrent blktraces are not allowed on sg0 02:09:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) r4 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r4, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1127.353996] blktrace: Concurrent blktraces are not allowed on sg0 [ 1127.370444] blktrace: Concurrent blktraces are not allowed on sg0 [ 1127.395027] blktrace: Concurrent blktraces are not allowed on sg0 02:09:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:09:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:09:49 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:09:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), 0x4) gettid() 02:09:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f0000000000000400000002190000"]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:09:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') socket$inet6_udplite(0xa, 0x2, 0x88) gettid() 02:09:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:49 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f0000000000000400000002190000"]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1127.497952] blktrace: Concurrent blktraces are not allowed on sg0 02:09:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), 0x4) gettid() 02:09:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) [ 1127.540208] blktrace: Concurrent blktraces are not allowed on sg0 02:09:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) r4 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r4, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:09:49 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:09:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:09:49 executing program 1: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:09:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1127.621484] blktrace: Concurrent blktraces are not allowed on sg0 02:09:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f0000000000000400000002190000"]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1127.676823] blktrace: Concurrent blktraces are not allowed on sg0 02:09:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), 0x4) gettid() 02:09:50 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, 0x0, 0x0) gettid() 02:10:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) gettid() 02:10:03 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:10:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:10:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b200000"]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:10:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1141.255275] blktrace: Concurrent blktraces are not allowed on sg0 [ 1141.256911] blktrace: Concurrent blktraces are not allowed on sg0 [ 1141.290239] blktrace: Concurrent blktraces are not allowed on sg0 [ 1141.291732] blktrace: Concurrent blktraces are not allowed on sg0 02:10:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b200000"]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:10:17 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) 02:10:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, 0x0, 0x0) gettid() 02:10:17 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r4 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r4, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:10:17 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:17 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000200)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:10:17 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c000000000008000100706369001100020030303030", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1154.858356] blktrace: Concurrent blktraces are not allowed on sg0 [ 1154.859056] blktrace: Concurrent blktraces are not allowed on sg0 [ 1154.880105] blktrace: Concurrent blktraces are not allowed on sg0 02:10:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, 0x0, 0x0) gettid() 02:10:17 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:17 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:10:17 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c000000000008000100706369001100020030303030", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:17 executing program 5: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:10:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:17 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) 02:10:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b200000"]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1155.002320] blktrace: Concurrent blktraces are not allowed on sg0 [ 1155.028929] blktrace: Concurrent blktraces are not allowed on sg0 02:10:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:17 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c000000000008000100706369001100020030303030", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/106]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:10:17 executing program 5: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000200)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r1, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r2, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) [ 1155.154049] blktrace: Concurrent blktraces are not allowed on sg0 02:10:17 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)=0xff) r2 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000200)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r1, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32=r2, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:17 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r3, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) r4 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r4, 0x7, 0xffffffffffffffff, 0x3) 02:10:17 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000140)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 02:10:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1155.250035] blktrace: Concurrent blktraces are not allowed on sg0 02:10:30 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) 02:10:30 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 1) [ 1168.160736] FAULT_INJECTION: forcing a failure. [ 1168.160736] name failslab, interval 1, probability 0, space 0, times 1 [ 1168.161790] CPU: 1 PID: 7409 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1168.162368] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1168.163092] Call Trace: [ 1168.163333] dump_stack+0x107/0x167 [ 1168.163649] should_fail.cold+0x5/0xa [ 1168.164102] should_failslab+0x5/0x20 02:10:30 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 1) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:10:30 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) (fail_nth: 1) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/106]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:10:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1168.164440] __kmalloc_track_caller+0x79/0x370 [ 1168.164915] ? strndup_user+0x74/0xe0 [ 1168.165422] memdup_user+0x22/0xd0 [ 1168.165747] strndup_user+0x74/0xe0 [ 1168.166103] __x64_sys_mount+0x133/0x300 [ 1168.166473] ? copy_mnt_ns+0xa00/0xa00 [ 1168.166835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1168.167338] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1168.167820] do_syscall_64+0x33/0x40 [ 1168.168255] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1168.168694] RIP: 0033:0x7fe8bba05b19 [ 1168.169090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1168.170674] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1168.171348] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1168.171957] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1168.172664] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1168.173307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1168.173939] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1168.189955] blktrace: Concurrent blktraces are not allowed on sg0 [ 1168.190803] FAULT_INJECTION: forcing a failure. [ 1168.190803] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1168.191885] CPU: 0 PID: 7415 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 1168.192467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1168.193186] Call Trace: [ 1168.193423] dump_stack+0x107/0x167 [ 1168.193737] should_fail.cold+0x5/0xa [ 1168.194071] _copy_from_user+0x2e/0x1b0 [ 1168.194420] __blk_trace_setup+0x96/0x180 [ 1168.194774] ? do_blk_trace_setup+0xc10/0xc10 [ 1168.195169] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1168.195620] blk_trace_setup+0x43/0x60 [ 1168.195959] sg_ioctl_common+0x634/0x2570 [ 1168.196318] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1168.196768] ? do_vfs_ioctl+0x283/0x10d0 [ 1168.197133] ? sg_write+0x120/0x120 [ 1168.197447] ? generic_block_fiemap+0x60/0x60 [ 1168.197830] ? lock_downgrade+0x6d0/0x6d0 [ 1168.198192] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1168.198610] ? wait_for_completion_io+0x270/0x270 [ 1168.199031] ? selinux_file_ioctl+0xb6/0x270 [ 1168.199406] ? sg_compat_ioctl+0x120/0x120 [ 1168.199769] sg_ioctl+0x8f/0x120 [ 1168.200062] __x64_sys_ioctl+0x19a/0x210 [ 1168.200411] do_syscall_64+0x33/0x40 [ 1168.200730] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1168.201176] RIP: 0033:0x7ffb8b320b19 [ 1168.201511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1168.203052] RSP: 002b:00007ffb88896188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1168.203700] RAX: ffffffffffffffda RBX: 00007ffb8b433f60 RCX: 00007ffb8b320b19 [ 1168.204303] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000005 [ 1168.204918] RBP: 00007ffb888961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1168.205518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1168.206124] R13: 00007fffe4656fcf R14: 00007ffb88896300 R15: 0000000000022000 [ 1168.208142] FAULT_INJECTION: forcing a failure. [ 1168.208142] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1168.209206] CPU: 0 PID: 7406 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1168.209783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1168.210475] Call Trace: [ 1168.210703] dump_stack+0x107/0x167 [ 1168.211018] should_fail.cold+0x5/0xa [ 1168.211355] _copy_from_user+0x2e/0x1b0 [ 1168.211715] perf_copy_attr+0x11a/0x8a0 [ 1168.212070] __do_sys_perf_event_open+0xb9/0x2e60 [ 1168.212490] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1168.212919] ? perf_event_set_output+0x5b0/0x5b0 [ 1168.213324] ? wait_for_completion_io+0x270/0x270 [ 1168.213748] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1168.214193] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1168.214636] do_syscall_64+0x33/0x40 [ 1168.214960] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1168.215394] RIP: 0033:0x7f08909a9b19 [ 1168.215716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1168.217292] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1168.217940] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1168.218545] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1168.219158] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1168.219767] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1168.220372] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1168.221949] FAULT_INJECTION: forcing a failure. [ 1168.221949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1168.223008] CPU: 0 PID: 7404 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1168.223581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1168.224276] Call Trace: [ 1168.224504] dump_stack+0x107/0x167 [ 1168.224837] should_fail.cold+0x5/0xa [ 1168.225172] _copy_from_user+0x2e/0x1b0 [ 1168.225519] perf_copy_attr+0x11a/0x8a0 [ 1168.225870] __do_sys_perf_event_open+0xb9/0x2e60 [ 1168.226288] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1168.226704] ? perf_event_set_output+0x5b0/0x5b0 [ 1168.227111] ? wait_for_completion_io+0x270/0x270 [ 1168.227538] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1168.227991] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1168.228434] do_syscall_64+0x33/0x40 [ 1168.228761] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1168.229203] RIP: 0033:0x7f229d85eb19 [ 1168.229521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1168.231073] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1168.231720] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1168.232325] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1168.232939] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1168.233546] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1168.234156] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:10:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:30 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:30 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 2) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:10:30 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 2) 02:10:30 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 2) [ 1168.343056] FAULT_INJECTION: forcing a failure. [ 1168.343056] name failslab, interval 1, probability 0, space 0, times 0 [ 1168.344076] CPU: 0 PID: 7426 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1168.344652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1168.345360] Call Trace: [ 1168.345597] dump_stack+0x107/0x167 [ 1168.345918] should_fail.cold+0x5/0xa [ 1168.346253] ? perf_event_alloc.part.0+0x5b/0x2b70 [ 1168.346689] should_failslab+0x5/0x20 [ 1168.347033] kmem_cache_alloc_trace+0x55/0x320 [ 1168.347437] perf_event_alloc.part.0+0x5b/0x2b70 [ 1168.347850] ? alloc_fd+0x2e7/0x670 [ 1168.348184] __do_sys_perf_event_open+0x579/0x2e60 [ 1168.348627] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1168.349050] ? perf_event_set_output+0x5b0/0x5b0 [ 1168.349457] ? wait_for_completion_io+0x270/0x270 [ 1168.349886] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1168.350334] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1168.350776] do_syscall_64+0x33/0x40 [ 1168.351101] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1168.351539] RIP: 0033:0x7f229d85eb19 [ 1168.351859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1168.353424] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1168.354073] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1168.354681] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1168.355285] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1168.355884] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1168.356488] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1168.366069] FAULT_INJECTION: forcing a failure. [ 1168.366069] name failslab, interval 1, probability 0, space 0, times 0 [ 1168.367139] CPU: 0 PID: 7429 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1168.367745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1168.368467] Call Trace: [ 1168.368721] dump_stack+0x107/0x167 [ 1168.369082] should_fail.cold+0x5/0xa [ 1168.369443] ? create_object.isra.0+0x3a/0xa20 [ 1168.369868] should_failslab+0x5/0x20 [ 1168.370215] kmem_cache_alloc+0x5b/0x310 [ 1168.370563] create_object.isra.0+0x3a/0xa20 [ 1168.370934] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1168.371367] __kmalloc_track_caller+0x177/0x370 [ 1168.371770] ? strndup_user+0x74/0xe0 [ 1168.372100] memdup_user+0x22/0xd0 [ 1168.372407] strndup_user+0x74/0xe0 [ 1168.372719] __x64_sys_mount+0x133/0x300 [ 1168.373087] ? copy_mnt_ns+0xa00/0xa00 [ 1168.373424] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1168.373869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1168.374309] do_syscall_64+0x33/0x40 [ 1168.374627] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1168.375062] RIP: 0033:0x7fe8bba05b19 02:10:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1168.375378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1168.376950] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1168.384954] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1168.385547] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1168.386137] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1168.386365] FAULT_INJECTION: forcing a failure. [ 1168.386365] name failslab, interval 1, probability 0, space 0, times 0 [ 1168.386728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1168.386736] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1168.389119] CPU: 1 PID: 7431 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1168.389698] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1168.390498] Call Trace: [ 1168.390738] dump_stack+0x107/0x167 [ 1168.391056] should_fail.cold+0x5/0xa [ 1168.391415] ? perf_event_alloc.part.0+0x5b/0x2b70 [ 1168.391845] should_failslab+0x5/0x20 [ 1168.392207] kmem_cache_alloc_trace+0x55/0x320 [ 1168.392604] perf_event_alloc.part.0+0x5b/0x2b70 [ 1168.393073] ? alloc_fd+0x2e7/0x670 [ 1168.393420] __do_sys_perf_event_open+0x579/0x2e60 [ 1168.393857] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1168.394388] ? perf_event_set_output+0x5b0/0x5b0 [ 1168.394797] ? wait_for_completion_io+0x270/0x270 [ 1168.395237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1168.395710] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1168.396156] do_syscall_64+0x33/0x40 [ 1168.396501] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1168.396979] RIP: 0033:0x7f08909a9b19 [ 1168.397305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1168.398976] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1168.399653] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1168.400263] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1168.400902] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1168.401508] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1168.402138] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:10:30 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1168.445665] blktrace: Concurrent blktraces are not allowed on sg0 02:10:30 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 3) [ 1168.534681] FAULT_INJECTION: forcing a failure. [ 1168.534681] name failslab, interval 1, probability 0, space 0, times 0 [ 1168.535674] CPU: 0 PID: 7440 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1168.536244] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1168.537004] Call Trace: [ 1168.537236] dump_stack+0x107/0x167 [ 1168.537551] should_fail.cold+0x5/0xa [ 1168.537878] ? create_object.isra.0+0x3a/0xa20 [ 1168.538268] should_failslab+0x5/0x20 [ 1168.538596] kmem_cache_alloc+0x5b/0x310 [ 1168.538939] ? perf_event_alloc.part.0+0x5b/0x2b70 [ 1168.539353] create_object.isra.0+0x3a/0xa20 [ 1168.539736] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1168.540175] kmem_cache_alloc_trace+0x151/0x320 [ 1168.540572] perf_event_alloc.part.0+0x5b/0x2b70 [ 1168.540993] ? alloc_fd+0x2e7/0x670 [ 1168.541308] __do_sys_perf_event_open+0x579/0x2e60 [ 1168.541743] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1168.542150] ? perf_event_set_output+0x5b0/0x5b0 [ 1168.542548] ? wait_for_completion_io+0x270/0x270 [ 1168.542976] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1168.543420] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1168.543861] do_syscall_64+0x33/0x40 [ 1168.544177] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1168.544609] RIP: 0033:0x7f229d85eb19 [ 1168.544940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1168.546475] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1168.547114] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1168.547714] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1168.548313] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1168.548934] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1168.549529] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:10:44 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 4) [ 1182.229030] FAULT_INJECTION: forcing a failure. [ 1182.229030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1182.230108] CPU: 0 PID: 7449 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1182.230691] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.231333] Call Trace: [ 1182.231694] dump_stack+0x107/0x167 [ 1182.231991] should_fail.cold+0x5/0xa [ 1182.232216] FAULT_INJECTION: forcing a failure. [ 1182.232216] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.232302] _copy_from_user+0x2e/0x1b0 [ 1182.232331] memdup_user+0x65/0xd0 [ 1182.234058] strndup_user+0x74/0xe0 [ 1182.234348] __x64_sys_mount+0x133/0x300 [ 1182.234716] ? copy_mnt_ns+0xa00/0xa00 [ 1182.235040] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1182.235509] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1182.235917] do_syscall_64+0x33/0x40 [ 1182.236214] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1182.236749] RIP: 0033:0x7fe8bba05b19 [ 1182.237064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1182.238598] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1182.239197] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1182.239799] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1182.240407] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.241082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.241685] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1182.242265] CPU: 1 PID: 7450 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1182.242864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.243563] Call Trace: [ 1182.243802] dump_stack+0x107/0x167 [ 1182.244121] should_fail.cold+0x5/0xa [ 1182.244466] should_failslab+0x5/0x20 [ 1182.244802] __kmalloc_track_caller+0x79/0x370 [ 1182.245220] ? strndup_user+0x74/0xe0 [ 1182.245560] memdup_user+0x22/0xd0 [ 1182.245868] strndup_user+0x74/0xe0 [ 1182.246192] perf_uprobe_init+0x6b/0x210 [ 1182.246554] perf_uprobe_event_init+0xff/0x1d0 [ 1182.246944] perf_try_init_event+0x130/0x570 [ 1182.247326] perf_event_alloc.part.0+0xd96/0x2b70 [ 1182.247750] __do_sys_perf_event_open+0x579/0x2e60 [ 1182.248184] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1182.248603] ? perf_event_set_output+0x5b0/0x5b0 [ 1182.249026] ? wait_for_completion_io+0x270/0x270 [ 1182.249463] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1182.249908] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1182.250352] do_syscall_64+0x33/0x40 [ 1182.250674] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1182.251110] RIP: 0033:0x7f229d85eb19 [ 1182.251438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1182.252993] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1182.253643] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1182.254245] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1182.254846] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.255449] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1182.256050] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:10:44 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 3) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:10:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/106]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:10:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:44 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 3) 02:10:44 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) (fail_nth: 2) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:44 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e65", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1182.286262] blktrace: Concurrent blktraces are not allowed on sg0 [ 1182.286900] FAULT_INJECTION: forcing a failure. [ 1182.286900] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1182.286932] blktrace: Concurrent blktraces are not allowed on sg0 [ 1182.288619] CPU: 1 PID: 7453 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 1182.289214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.289909] Call Trace: [ 1182.290142] dump_stack+0x107/0x167 [ 1182.290458] should_fail.cold+0x5/0xa [ 1182.290800] _copy_to_user+0x2e/0x180 [ 1182.291141] simple_read_from_buffer+0xcc/0x160 [ 1182.291550] proc_fail_nth_read+0x198/0x230 [ 1182.291921] ? proc_sessionid_read+0x230/0x230 [ 1182.292325] ? security_file_permission+0xb1/0xe0 [ 1182.292743] ? proc_sessionid_read+0x230/0x230 [ 1182.293156] vfs_read+0x228/0x620 [ 1182.293463] ksys_read+0x12d/0x260 [ 1182.293770] ? vfs_write+0xb10/0xb10 [ 1182.294097] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1182.294545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1182.294985] do_syscall_64+0x33/0x40 [ 1182.295307] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1182.295741] RIP: 0033:0x7ffb8b2d369c [ 1182.296062] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1182.297612] RSP: 002b:00007ffb88896170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1182.298256] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007ffb8b2d369c [ 1182.298860] RDX: 000000000000000f RSI: 00007ffb888961e0 RDI: 0000000000000006 [ 1182.299466] RBP: 00007ffb888961d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.300069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.300672] R13: 00007fffe4656fcf R14: 00007ffb88896300 R15: 0000000000022000 [ 1182.303199] blktrace: Concurrent blktraces are not allowed on sg0 02:10:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:44 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 4) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1182.342199] FAULT_INJECTION: forcing a failure. [ 1182.342199] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.343240] CPU: 0 PID: 7460 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1182.343785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.344437] Call Trace: [ 1182.344658] dump_stack+0x107/0x167 [ 1182.344980] should_fail.cold+0x5/0xa [ 1182.345296] ? create_object.isra.0+0x3a/0xa20 [ 1182.345670] should_failslab+0x5/0x20 [ 1182.345982] kmem_cache_alloc+0x5b/0x310 [ 1182.346311] create_object.isra.0+0x3a/0xa20 [ 1182.346668] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1182.347078] kmem_cache_alloc_trace+0x151/0x320 [ 1182.347457] perf_event_alloc.part.0+0x5b/0x2b70 [ 1182.347838] ? alloc_fd+0x2e7/0x670 [ 1182.348137] __do_sys_perf_event_open+0x579/0x2e60 [ 1182.348541] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1182.349039] ? perf_event_set_output+0x5b0/0x5b0 [ 1182.349417] ? wait_for_completion_io+0x270/0x270 [ 1182.349816] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1182.350233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1182.350639] do_syscall_64+0x33/0x40 [ 1182.350937] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1182.351340] RIP: 0033:0x7f08909a9b19 [ 1182.351638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1182.353098] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1182.353698] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1182.354258] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1182.354818] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.355379] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1182.355939] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1182.408667] FAULT_INJECTION: forcing a failure. [ 1182.408667] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.409729] CPU: 1 PID: 7465 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1182.410303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1182.410997] Call Trace: [ 1182.411235] dump_stack+0x107/0x167 [ 1182.411549] should_fail.cold+0x5/0xa [ 1182.411877] ? getname_flags.part.0+0x50/0x4f0 [ 1182.412275] should_failslab+0x5/0x20 [ 1182.412608] kmem_cache_alloc+0x5b/0x310 [ 1182.412976] getname_flags.part.0+0x50/0x4f0 [ 1182.413356] user_path_at_empty+0xa1/0x100 [ 1182.413720] __x64_sys_mount+0x1e9/0x300 [ 1182.414067] ? copy_mnt_ns+0xa00/0xa00 [ 1182.414410] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1182.414857] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1182.415298] do_syscall_64+0x33/0x40 [ 1182.415619] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1182.416054] RIP: 0033:0x7fe8bba05b19 [ 1182.416373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1182.417920] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1182.418564] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1182.419164] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1182.419762] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.420360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1182.420977] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:10:57 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 4) 02:10:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/114]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1195.280851] blktrace: Concurrent blktraces are not allowed on sg0 [ 1195.282484] blktrace: Concurrent blktraces are not allowed on sg0 [ 1195.286024] blktrace: Concurrent blktraces are not allowed on sg0 [ 1195.288242] FAULT_INJECTION: forcing a failure. [ 1195.288242] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.289475] CPU: 0 PID: 7485 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1195.290088] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.290843] Call Trace: [ 1195.291097] dump_stack+0x107/0x167 [ 1195.291434] should_fail.cold+0x5/0xa [ 1195.291802] ? create_object.isra.0+0x3a/0xa20 [ 1195.292287] should_failslab+0x5/0x20 [ 1195.292692] kmem_cache_alloc+0x5b/0x310 [ 1195.297141] ? __might_fault+0xd3/0x180 [ 1195.297577] create_object.isra.0+0x3a/0xa20 [ 1195.298063] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1195.298622] kmem_cache_alloc+0x159/0x310 [ 1195.299083] getname_flags.part.0+0x50/0x4f0 [ 1195.299569] user_path_at_empty+0xa1/0x100 [ 1195.300034] __x64_sys_mount+0x1e9/0x300 [ 1195.300479] ? copy_mnt_ns+0xa00/0xa00 [ 1195.300916] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1195.301471] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1195.302036] do_syscall_64+0x33/0x40 [ 1195.302445] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1195.302997] RIP: 0033:0x7fe8bba05b19 [ 1195.303406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.305322] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1195.308903] FAULT_INJECTION: forcing a failure. [ 1195.308903] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.312969] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1195.312978] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1195.312986] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1195.312994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1195.313002] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1195.317124] CPU: 1 PID: 7473 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1195.317694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.318380] Call Trace: [ 1195.318606] dump_stack+0x107/0x167 [ 1195.318913] should_fail.cold+0x5/0xa [ 1195.319243] should_failslab+0x5/0x20 [ 1195.319564] __kmalloc_track_caller+0x79/0x370 [ 1195.319958] ? strndup_user+0x74/0xe0 [ 1195.320285] memdup_user+0x22/0xd0 [ 1195.320589] strndup_user+0x74/0xe0 02:10:57 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e65", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:57 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 5) 02:10:57 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 5) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1195.320905] perf_uprobe_init+0x6b/0x210 [ 1195.325386] perf_uprobe_event_init+0xff/0x1d0 [ 1195.325776] perf_try_init_event+0x130/0x570 [ 1195.326153] perf_event_alloc.part.0+0xd96/0x2b70 [ 1195.326568] __do_sys_perf_event_open+0x579/0x2e60 [ 1195.326995] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1195.327403] ? perf_event_set_output+0x5b0/0x5b0 [ 1195.327804] ? wait_for_completion_io+0x270/0x270 [ 1195.328230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1195.328670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1195.329425] do_syscall_64+0x33/0x40 [ 1195.330103] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1195.330964] RIP: 0033:0x7f08909a9b19 [ 1195.331587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.335226] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1195.336540] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1195.338030] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1195.339229] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1195.340575] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1195.341834] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1195.356641] FAULT_INJECTION: forcing a failure. [ 1195.356641] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.359179] CPU: 1 PID: 7482 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1195.360523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.362508] Call Trace: [ 1195.363014] dump_stack+0x107/0x167 [ 1195.363772] should_fail.cold+0x5/0xa [ 1195.364527] ? create_object.isra.0+0x3a/0xa20 [ 1195.365618] should_failslab+0x5/0x20 [ 1195.366351] kmem_cache_alloc+0x5b/0x310 [ 1195.367126] ? cred_has_capability.isra.0+0x143/0x2b0 [ 1195.368107] create_object.isra.0+0x3a/0xa20 [ 1195.368994] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1195.370304] __kmalloc_track_caller+0x177/0x370 [ 1195.371264] ? strndup_user+0x74/0xe0 [ 1195.372069] memdup_user+0x22/0xd0 [ 1195.372831] strndup_user+0x74/0xe0 [ 1195.373257] perf_uprobe_init+0x6b/0x210 [ 1195.373656] perf_uprobe_event_init+0xff/0x1d0 [ 1195.374097] perf_try_init_event+0x130/0x570 [ 1195.374503] perf_event_alloc.part.0+0xd96/0x2b70 [ 1195.374986] __do_sys_perf_event_open+0x579/0x2e60 [ 1195.375456] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1195.375921] ? perf_event_set_output+0x5b0/0x5b0 [ 1195.376378] ? wait_for_completion_io+0x270/0x270 [ 1195.376852] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1195.377426] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1195.377909] do_syscall_64+0x33/0x40 [ 1195.378286] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1195.378753] RIP: 0033:0x7f229d85eb19 [ 1195.379107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.380770] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1195.381477] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1195.382123] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1195.382769] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1195.383406] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1195.384039] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:10:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:10:57 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 5) 02:10:57 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 6) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:10:57 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e65", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:10:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:10:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1195.520876] FAULT_INJECTION: forcing a failure. [ 1195.520876] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1195.523550] CPU: 1 PID: 7499 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1195.524857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.526792] Call Trace: [ 1195.527289] dump_stack+0x107/0x167 [ 1195.527971] should_fail.cold+0x5/0xa [ 1195.528687] strncpy_from_user+0x34/0x470 [ 1195.529636] getname_flags.part.0+0x95/0x4f0 [ 1195.530486] user_path_at_empty+0xa1/0x100 [ 1195.531298] __x64_sys_mount+0x1e9/0x300 [ 1195.532046] ? copy_mnt_ns+0xa00/0xa00 [ 1195.532825] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1195.534045] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1195.535010] do_syscall_64+0x33/0x40 [ 1195.535713] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1195.536650] RIP: 0033:0x7fe8bba05b19 [ 1195.537451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.540860] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1195.542649] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1195.543973] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1195.545423] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1195.546766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1195.548069] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:10:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/114]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1195.563701] FAULT_INJECTION: forcing a failure. [ 1195.563701] name failslab, interval 1, probability 0, space 0, times 0 [ 1195.566091] CPU: 1 PID: 7494 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1195.567385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1195.569024] Call Trace: [ 1195.569520] dump_stack+0x107/0x167 [ 1195.570233] should_fail.cold+0x5/0xa [ 1195.570953] ? create_object.isra.0+0x3a/0xa20 [ 1195.571827] should_failslab+0x5/0x20 [ 1195.572538] kmem_cache_alloc+0x5b/0x310 [ 1195.573458] ? cred_has_capability.isra.0+0x143/0x2b0 [ 1195.574520] create_object.isra.0+0x3a/0xa20 [ 1195.575504] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1195.575526] __kmalloc_track_caller+0x177/0x370 [ 1195.576981] ? strndup_user+0x74/0xe0 [ 1195.577903] memdup_user+0x22/0xd0 [ 1195.578582] strndup_user+0x74/0xe0 [ 1195.579271] perf_uprobe_init+0x6b/0x210 [ 1195.580020] perf_uprobe_event_init+0xff/0x1d0 [ 1195.580859] perf_try_init_event+0x130/0x570 [ 1195.581879] perf_event_alloc.part.0+0xd96/0x2b70 [ 1195.582785] __do_sys_perf_event_open+0x579/0x2e60 [ 1195.583722] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1195.584648] ? perf_event_set_output+0x5b0/0x5b0 [ 1195.585747] ? wait_for_completion_io+0x270/0x270 [ 1195.586694] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1195.587698] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1195.588696] do_syscall_64+0x33/0x40 [ 1195.589561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1195.590588] RIP: 0033:0x7f08909a9b19 [ 1195.591287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1195.595376] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1195.596833] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1195.598561] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1195.599920] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1195.601453] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1195.602795] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1195.628360] blktrace: Concurrent blktraces are not allowed on sg0 02:11:11 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 6) 02:11:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:11 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 7) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:11:11 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 6) 02:11:11 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:11 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/114]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:11:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x1267, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1208.856648] FAULT_INJECTION: forcing a failure. [ 1208.856648] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.860106] FAULT_INJECTION: forcing a failure. [ 1208.860106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1208.861683] CPU: 1 PID: 7523 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1208.861696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.863881] Call Trace: [ 1208.864115] dump_stack+0x107/0x167 [ 1208.864431] should_fail.cold+0x5/0xa [ 1208.864767] ? alloc_fs_context+0x57/0x840 [ 1208.865152] should_failslab+0x5/0x20 [ 1208.865487] kmem_cache_alloc_trace+0x55/0x320 [ 1208.865879] alloc_fs_context+0x57/0x840 [ 1208.866226] path_mount+0xaa3/0x2120 [ 1208.866555] ? strncpy_from_user+0x9e/0x470 [ 1208.866920] ? finish_automount+0xa90/0xa90 [ 1208.867285] ? getname_flags.part.0+0x1dd/0x4f0 [ 1208.867689] __x64_sys_mount+0x282/0x300 [ 1208.868032] ? copy_mnt_ns+0xa00/0xa00 [ 1208.868373] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.868828] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.869284] do_syscall_64+0x33/0x40 [ 1208.869606] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1208.870035] RIP: 0033:0x7fe8bba05b19 [ 1208.870352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.871875] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1208.872517] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1208.877141] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1208.877734] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1208.878322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1208.878914] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1208.879526] CPU: 0 PID: 7524 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1208.885528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.886261] Call Trace: [ 1208.886504] dump_stack+0x107/0x167 [ 1208.886824] should_fail.cold+0x5/0xa [ 1208.887157] _copy_from_user+0x2e/0x1b0 [ 1208.887526] memdup_user+0x65/0xd0 [ 1208.887855] strndup_user+0x74/0xe0 [ 1208.888178] perf_uprobe_init+0x6b/0x210 [ 1208.888532] perf_uprobe_event_init+0xff/0x1d0 [ 1208.888911] perf_try_init_event+0x130/0x570 [ 1208.889299] perf_event_alloc.part.0+0xd96/0x2b70 [ 1208.889713] __do_sys_perf_event_open+0x579/0x2e60 [ 1208.890127] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1208.890537] ? perf_event_set_output+0x5b0/0x5b0 [ 1208.890929] ? wait_for_completion_io+0x270/0x270 [ 1208.891345] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.891782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.892211] do_syscall_64+0x33/0x40 [ 1208.892527] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1208.892949] RIP: 0033:0x7f229d85eb19 [ 1208.893272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.894782] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1208.895415] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1208.896003] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1208.896594] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1208.897191] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1208.897782] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1208.910247] FAULT_INJECTION: forcing a failure. [ 1208.910247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1208.912708] CPU: 1 PID: 7522 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1208.914163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.915562] Call Trace: [ 1208.916006] dump_stack+0x107/0x167 [ 1208.916626] should_fail.cold+0x5/0xa [ 1208.917388] _copy_from_user+0x2e/0x1b0 [ 1208.918126] memdup_user+0x65/0xd0 [ 1208.918784] strndup_user+0x74/0xe0 [ 1208.919461] perf_uprobe_init+0x6b/0x210 02:11:11 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 7) [ 1208.920220] perf_uprobe_event_init+0xff/0x1d0 [ 1208.921082] perf_try_init_event+0x130/0x570 [ 1208.921484] perf_event_alloc.part.0+0xd96/0x2b70 [ 1208.921931] __do_sys_perf_event_open+0x579/0x2e60 [ 1208.922390] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1208.922834] ? perf_event_set_output+0x5b0/0x5b0 [ 1208.923260] ? wait_for_completion_io+0x270/0x270 [ 1208.923702] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.929403] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.929837] do_syscall_64+0x33/0x40 [ 1208.930146] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1208.930574] RIP: 0033:0x7f08909a9b19 [ 1208.930886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.932396] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1208.933038] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1208.933633] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1208.934218] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1208.934808] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1208.935397] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1208.978422] blktrace: Concurrent blktraces are not allowed on sg0 [ 1208.979091] blktrace: Concurrent blktraces are not allowed on sg0 [ 1208.984787] FAULT_INJECTION: forcing a failure. [ 1208.984787] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.986695] CPU: 0 PID: 7535 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1208.987299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.988036] Call Trace: [ 1208.988274] dump_stack+0x107/0x167 [ 1208.988587] should_fail.cold+0x5/0xa [ 1208.988914] ? getname_kernel+0x4e/0x370 [ 1208.989279] should_failslab+0x5/0x20 [ 1208.989608] kmem_cache_alloc+0x5b/0x310 [ 1208.989957] ? lock_downgrade+0x6d0/0x6d0 [ 1208.990304] getname_kernel+0x4e/0x370 [ 1208.990638] kern_path+0x1b/0x40 [ 1208.990926] create_local_trace_uprobe+0x86/0x4e0 [ 1208.991331] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1208.991729] ? memdup_user+0x7c/0xd0 [ 1208.992052] perf_uprobe_init+0x136/0x210 [ 1208.992415] perf_uprobe_event_init+0xff/0x1d0 [ 1208.992800] perf_try_init_event+0x130/0x570 [ 1208.993189] perf_event_alloc.part.0+0xd96/0x2b70 [ 1208.993609] __do_sys_perf_event_open+0x579/0x2e60 [ 1208.994030] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1208.994440] ? perf_event_set_output+0x5b0/0x5b0 [ 1208.994838] ? wait_for_completion_io+0x270/0x270 [ 1208.995258] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.995701] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.996134] do_syscall_64+0x33/0x40 [ 1208.996453] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1208.996878] RIP: 0033:0x7f229d85eb19 [ 1208.997206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.998730] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1208.999365] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1208.999963] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1209.000559] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.001170] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1209.001764] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:11:11 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:11 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 8) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:11:11 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 7) 02:11:11 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 8) [ 1209.063226] FAULT_INJECTION: forcing a failure. [ 1209.063226] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.064428] CPU: 1 PID: 7541 Comm: syz-executor.4 Not tainted 5.10.224 #1 02:11:11 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1209.065054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.065813] Call Trace: [ 1209.066067] dump_stack+0x107/0x167 [ 1209.066408] should_fail.cold+0x5/0xa [ 1209.066765] ? create_object.isra.0+0x3a/0xa20 [ 1209.067195] should_failslab+0x5/0x20 [ 1209.067548] kmem_cache_alloc+0x5b/0x310 [ 1209.067920] create_object.isra.0+0x3a/0xa20 [ 1209.068335] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1209.068803] kmem_cache_alloc_trace+0x151/0x320 [ 1209.069272] alloc_fs_context+0x57/0x840 [ 1209.069646] path_mount+0xaa3/0x2120 [ 1209.069993] ? strncpy_from_user+0x9e/0x470 [ 1209.070392] ? finish_automount+0xa90/0xa90 [ 1209.070798] ? getname_flags.part.0+0x1dd/0x4f0 [ 1209.071244] __x64_sys_mount+0x282/0x300 [ 1209.071617] ? copy_mnt_ns+0xa00/0xa00 [ 1209.071984] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.072462] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.072937] do_syscall_64+0x33/0x40 [ 1209.073299] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1209.073754] RIP: 0033:0x7fe8bba05b19 [ 1209.074100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.075746] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1209.076442] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1209.077114] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1209.077756] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.078396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1209.079031] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1209.109831] FAULT_INJECTION: forcing a failure. [ 1209.109831] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1209.111082] CPU: 0 PID: 7543 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1209.111689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.112418] Call Trace: [ 1209.112662] dump_stack+0x107/0x167 [ 1209.112993] should_fail.cold+0x5/0xa [ 1209.113362] __alloc_pages_nodemask+0x182/0x600 [ 1209.113791] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1209.114348] ? kmem_cache_alloc+0x301/0x310 [ 1209.114743] alloc_pages_current+0x187/0x280 [ 1209.115149] allocate_slab+0x26f/0x380 [ 1209.115507] ___slab_alloc+0x470/0x700 [ 1209.115866] ? getname_kernel+0x4e/0x370 [ 1209.116250] ? getname_kernel+0x4e/0x370 [ 1209.116629] ? kmem_cache_alloc+0x301/0x310 [ 1209.117034] ? getname_kernel+0x4e/0x370 [ 1209.117419] kmem_cache_alloc+0x301/0x310 [ 1209.117802] getname_kernel+0x4e/0x370 [ 1209.118162] kern_path+0x1b/0x40 [ 1209.118473] create_local_trace_uprobe+0x86/0x4e0 [ 1209.118911] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1209.119336] ? memdup_user+0x7c/0xd0 [ 1209.119687] perf_uprobe_init+0x136/0x210 [ 1209.120077] perf_uprobe_event_init+0xff/0x1d0 [ 1209.120492] perf_try_init_event+0x130/0x570 [ 1209.120897] perf_event_alloc.part.0+0xd96/0x2b70 [ 1209.121372] __do_sys_perf_event_open+0x579/0x2e60 [ 1209.121835] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1209.121973] FAULT_INJECTION: forcing a failure. [ 1209.121973] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.122256] ? perf_event_set_output+0x5b0/0x5b0 [ 1209.123559] ? wait_for_completion_io+0x270/0x270 [ 1209.123990] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.124438] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.124876] do_syscall_64+0x33/0x40 [ 1209.125216] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1209.125655] RIP: 0033:0x7f229d85eb19 [ 1209.125973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.127512] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1209.128152] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1209.128753] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1209.129370] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.129968] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1209.130570] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1209.131191] CPU: 1 PID: 7546 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1209.131817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.132569] Call Trace: [ 1209.132824] dump_stack+0x107/0x167 [ 1209.133162] should_fail.cold+0x5/0xa [ 1209.133517] ? getname_kernel+0x4e/0x370 [ 1209.133899] should_failslab+0x5/0x20 [ 1209.134251] kmem_cache_alloc+0x5b/0x310 [ 1209.134602] ? lock_downgrade+0x6d0/0x6d0 [ 1209.134955] getname_kernel+0x4e/0x370 [ 1209.135283] kern_path+0x1b/0x40 [ 1209.135573] create_local_trace_uprobe+0x86/0x4e0 [ 1209.135978] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1209.136366] ? memdup_user+0x7c/0xd0 [ 1209.136689] perf_uprobe_init+0x136/0x210 [ 1209.137054] perf_uprobe_event_init+0xff/0x1d0 [ 1209.137447] perf_try_init_event+0x130/0x570 [ 1209.137820] perf_event_alloc.part.0+0xd96/0x2b70 [ 1209.138233] __do_sys_perf_event_open+0x579/0x2e60 [ 1209.138655] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1209.139062] ? perf_event_set_output+0x5b0/0x5b0 [ 1209.139461] ? wait_for_completion_io+0x270/0x270 [ 1209.139885] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.140329] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.140766] do_syscall_64+0x33/0x40 [ 1209.141096] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1209.141528] RIP: 0033:0x7f08909a9b19 [ 1209.141842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.143358] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1209.143995] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1209.144588] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1209.145201] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.145792] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1209.146388] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:11:11 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/118]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:11:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x1274, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1209.216985] blktrace: Concurrent blktraces are not allowed on sg0 02:11:11 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:11 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 9) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:11:11 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/118]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1209.314319] FAULT_INJECTION: forcing a failure. [ 1209.314319] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.315504] CPU: 0 PID: 7561 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1209.316107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.316836] Call Trace: [ 1209.317103] dump_stack+0x107/0x167 [ 1209.317445] should_fail.cold+0x5/0xa [ 1209.317794] ? alloc_super+0x52/0xa90 [ 1209.318144] should_failslab+0x5/0x20 [ 1209.318492] kmem_cache_alloc_trace+0x55/0x320 [ 1209.318905] ? do_raw_spin_lock+0x121/0x260 [ 1209.319291] ? fput+0x20/0x20 [ 1209.319575] alloc_super+0x52/0xa90 [ 1209.319905] ? fput+0x20/0x20 [ 1209.320187] sget_fc+0x110/0x860 [ 1209.320496] ? set_anon_super+0xc0/0xc0 [ 1209.320859] ? rpc_kill_sb+0x1b0/0x1b0 [ 1209.321235] get_tree_keyed+0x55/0x210 [ 1209.321591] vfs_get_tree+0x8e/0x300 [ 1209.321931] path_mount+0x1429/0x2120 [ 1209.322288] ? strncpy_from_user+0x9e/0x470 [ 1209.322677] ? finish_automount+0xa90/0xa90 [ 1209.323066] ? getname_flags.part.0+0x1dd/0x4f0 [ 1209.323495] __x64_sys_mount+0x282/0x300 [ 1209.323859] ? copy_mnt_ns+0xa00/0xa00 [ 1209.324215] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.324692] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.325177] do_syscall_64+0x33/0x40 [ 1209.325519] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1209.325982] RIP: 0033:0x7fe8bba05b19 [ 1209.326320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.327959] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1209.328655] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1209.329317] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1209.329951] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.330587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1209.331219] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:11:11 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 8) 02:11:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x1275, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1209.370211] blktrace: Concurrent blktraces are not allowed on sg0 [ 1209.437033] FAULT_INJECTION: forcing a failure. [ 1209.437033] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.438137] CPU: 1 PID: 7572 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1209.438747] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.439481] Call Trace: [ 1209.439732] dump_stack+0x107/0x167 [ 1209.440067] should_fail.cold+0x5/0xa [ 1209.440419] ? create_object.isra.0+0x3a/0xa20 [ 1209.440847] should_failslab+0x5/0x20 [ 1209.441216] kmem_cache_alloc+0x5b/0x310 [ 1209.441592] create_object.isra.0+0x3a/0xa20 [ 1209.441991] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1209.442458] kmem_cache_alloc+0x159/0x310 [ 1209.442839] getname_kernel+0x4e/0x370 [ 1209.443193] kern_path+0x1b/0x40 [ 1209.443512] create_local_trace_uprobe+0x86/0x4e0 [ 1209.443956] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1209.444384] ? memdup_user+0x7c/0xd0 [ 1209.444741] perf_uprobe_init+0x136/0x210 [ 1209.445153] perf_uprobe_event_init+0xff/0x1d0 [ 1209.445576] perf_try_init_event+0x130/0x570 [ 1209.445978] perf_event_alloc.part.0+0xd96/0x2b70 [ 1209.446424] __do_sys_perf_event_open+0x579/0x2e60 [ 1209.446888] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1209.447330] ? perf_event_set_output+0x5b0/0x5b0 [ 1209.447770] ? wait_for_completion_io+0x270/0x270 [ 1209.448237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.448720] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.449211] do_syscall_64+0x33/0x40 [ 1209.449531] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1209.449989] RIP: 0033:0x7f08909a9b19 [ 1209.450334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.451983] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1209.452679] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1209.453338] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1209.453976] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1209.454617] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1209.455258] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:11:24 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 9) 02:11:24 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 9) 02:11:24 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x1276, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:24 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 10) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:11:24 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:24 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:24 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/118]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1222.630508] blktrace: Concurrent blktraces are not allowed on sg0 [ 1222.642167] FAULT_INJECTION: forcing a failure. [ 1222.642167] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.643239] CPU: 0 PID: 7597 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1222.643862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1222.644601] Call Trace: [ 1222.644852] dump_stack+0x107/0x167 [ 1222.645203] should_fail.cold+0x5/0xa [ 1222.645558] ? create_object.isra.0+0x3a/0xa20 [ 1222.645980] should_failslab+0x5/0x20 [ 1222.646331] kmem_cache_alloc+0x5b/0x310 [ 1222.646703] ? create_object.isra.0+0x3ad/0xa20 [ 1222.647129] create_object.isra.0+0x3a/0xa20 [ 1222.647535] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1222.648004] __kmalloc_node+0x1ae/0x420 [ 1222.648370] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1222.648816] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1222.649273] ? trace_hardirqs_on+0x5b/0x180 [ 1222.649672] kmem_cache_alloc_trace+0x169/0x320 [ 1222.650120] alloc_fs_context+0x57/0x840 [ 1222.650503] path_mount+0xaa3/0x2120 [ 1222.650860] ? strncpy_from_user+0x9e/0x470 [ 1222.651260] ? finish_automount+0xa90/0xa90 [ 1222.651665] ? getname_flags.part.0+0x1dd/0x4f0 [ 1222.652094] __x64_sys_mount+0x282/0x300 [ 1222.652465] ? copy_mnt_ns+0xa00/0xa00 [ 1222.652770] FAULT_INJECTION: forcing a failure. [ 1222.652770] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.652831] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1222.652853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1222.654764] do_syscall_64+0x33/0x40 [ 1222.655083] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1222.655520] RIP: 0033:0x7fe8bba05b19 [ 1222.655839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1222.657377] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1222.658025] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1222.658623] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1222.659220] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1222.659823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1222.660426] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1222.661046] CPU: 1 PID: 7585 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1222.661697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1222.662454] Call Trace: [ 1222.662699] dump_stack+0x107/0x167 [ 1222.663060] should_fail.cold+0x5/0xa [ 1222.663412] ? igrab+0xc0/0xc0 [ 1222.663698] ? proc_self_get_link+0x18b/0x200 [ 1222.664097] should_failslab+0x5/0x20 [ 1222.664423] kmem_cache_alloc_trace+0x55/0x320 [ 1222.664814] ? proc_ns_dir_lookup+0x2c0/0x2c0 [ 1222.665219] proc_self_get_link+0x18b/0x200 [ 1222.665589] step_into+0x1595/0x1ce0 [ 1222.665908] ? lookup_fast+0x6e0/0x6e0 [ 1222.666255] ? try_to_unlazy_next+0x4f0/0x4f0 [ 1222.666642] walk_component+0x171/0x6a0 [ 1222.666973] ? trace_hardirqs_on+0x5b/0x180 [ 1222.667348] ? handle_dots.part.0+0x15c0/0x15c0 [ 1222.667764] ? security_inode_permission+0xcb/0x100 [ 1222.668185] link_path_walk.part.0+0x699/0xbf0 [ 1222.668603] ? walk_component+0x6a0/0x6a0 [ 1222.668959] path_lookupat+0xb7/0x860 [ 1222.669312] filename_lookup+0x1b1/0x570 [ 1222.669657] ? may_linkat+0x230/0x230 [ 1222.669989] ? trace_hardirqs_on+0x5b/0x180 [ 1222.670375] ? memcpy+0x39/0x60 [ 1222.670659] ? getname_kernel+0x21e/0x370 [ 1222.671011] create_local_trace_uprobe+0x86/0x4e0 [ 1222.671437] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1222.671831] ? memdup_user+0x7c/0xd0 [ 1222.672153] perf_uprobe_init+0x136/0x210 [ 1222.672538] perf_uprobe_event_init+0xff/0x1d0 [ 1222.672919] perf_try_init_event+0x130/0x570 [ 1222.673301] perf_event_alloc.part.0+0xd96/0x2b70 [ 1222.673742] __do_sys_perf_event_open+0x579/0x2e60 [ 1222.674158] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1222.674583] ? perf_event_set_output+0x5b0/0x5b0 [ 1222.674980] ? wait_for_completion_io+0x270/0x270 [ 1222.675405] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1222.675862] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1222.676292] do_syscall_64+0x33/0x40 [ 1222.676614] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1222.677055] RIP: 0033:0x7f08909a9b19 [ 1222.677381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1222.678935] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1222.679577] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1222.680183] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1222.680776] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1222.681401] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1222.682015] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1222.683829] FAULT_INJECTION: forcing a failure. [ 1222.683829] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.684930] CPU: 1 PID: 7586 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1222.685584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1222.686339] Call Trace: [ 1222.686582] dump_stack+0x107/0x167 [ 1222.686911] should_fail.cold+0x5/0xa [ 1222.687285] ? igrab+0xc0/0xc0 [ 1222.687585] ? proc_self_get_link+0x18b/0x200 [ 1222.687999] should_failslab+0x5/0x20 [ 1222.688377] kmem_cache_alloc_trace+0x55/0x320 [ 1222.688793] ? proc_ns_dir_lookup+0x2c0/0x2c0 [ 1222.689207] proc_self_get_link+0x18b/0x200 [ 1222.689616] step_into+0x1595/0x1ce0 [ 1222.689959] ? lookup_fast+0x6e0/0x6e0 [ 1222.690320] ? try_to_unlazy_next+0x4f0/0x4f0 [ 1222.690764] walk_component+0x171/0x6a0 [ 1222.691129] ? trace_hardirqs_on+0x5b/0x180 [ 1222.691552] ? handle_dots.part.0+0x15c0/0x15c0 [ 1222.691977] ? security_inode_permission+0xcb/0x100 [ 1222.692435] link_path_walk.part.0+0x699/0xbf0 [ 1222.692884] ? walk_component+0x6a0/0x6a0 [ 1222.693291] path_lookupat+0xb7/0x860 [ 1222.693675] filename_lookup+0x1b1/0x570 [ 1222.694040] ? may_linkat+0x230/0x230 [ 1222.694396] ? trace_hardirqs_on+0x5b/0x180 [ 1222.694816] ? memcpy+0x39/0x60 [ 1222.695116] ? getname_kernel+0x21e/0x370 [ 1222.695495] create_local_trace_uprobe+0x86/0x4e0 [ 1222.695949] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1222.696374] ? memdup_user+0x7c/0xd0 [ 1222.696728] perf_uprobe_init+0x136/0x210 [ 1222.697148] perf_uprobe_event_init+0xff/0x1d0 [ 1222.697579] perf_try_init_event+0x130/0x570 [ 1222.697999] perf_event_alloc.part.0+0xd96/0x2b70 [ 1222.698444] __do_sys_perf_event_open+0x579/0x2e60 [ 1222.698898] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1222.699357] ? perf_event_set_output+0x5b0/0x5b0 [ 1222.699800] ? wait_for_completion_io+0x270/0x270 [ 1222.700282] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1222.700768] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1222.701280] do_syscall_64+0x33/0x40 [ 1222.701627] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1222.702098] RIP: 0033:0x7f229d85eb19 [ 1222.702462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1222.704124] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1222.704840] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1222.705519] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1222.706159] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1222.706822] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1222.707480] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:11:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:25 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2201, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:38 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 11) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1235.850270] FAULT_INJECTION: forcing a failure. [ 1235.850270] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.851283] CPU: 1 PID: 7627 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1235.851859] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1235.852556] Call Trace: [ 1235.852792] dump_stack+0x107/0x167 02:11:38 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 10) 02:11:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2202, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:38 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/120]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:11:38 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:38 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 10) 02:11:38 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1235.853105] should_fail.cold+0x5/0xa [ 1235.877387] ? find_held_lock+0x2c/0x110 [ 1235.877738] ? create_object.isra.0+0x3a/0xa20 [ 1235.878128] should_failslab+0x5/0x20 [ 1235.878459] kmem_cache_alloc+0x5b/0x310 [ 1235.878806] ? __task_pid_nr_ns+0x16a/0x4f0 [ 1235.879171] create_object.isra.0+0x3a/0xa20 [ 1235.879547] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1235.879977] kmem_cache_alloc_trace+0x151/0x320 [ 1235.880374] ? proc_ns_dir_lookup+0x2c0/0x2c0 [ 1235.880753] proc_self_get_link+0x18b/0x200 [ 1235.881116] step_into+0x1595/0x1ce0 [ 1235.881457] ? lookup_fast+0x6e0/0x6e0 [ 1235.881785] ? try_to_unlazy_next+0x4f0/0x4f0 [ 1235.882168] walk_component+0x171/0x6a0 [ 1235.882506] ? trace_hardirqs_on+0x5b/0x180 [ 1235.882867] ? handle_dots.part.0+0x15c0/0x15c0 [ 1235.883270] ? security_inode_permission+0xcb/0x100 [ 1235.883703] link_path_walk.part.0+0x699/0xbf0 [ 1235.884093] ? walk_component+0x6a0/0x6a0 [ 1235.884454] path_lookupat+0xb7/0x860 [ 1235.884782] filename_lookup+0x1b1/0x570 [ 1235.885124] ? may_linkat+0x230/0x230 [ 1235.885479] ? trace_hardirqs_on+0x5b/0x180 [ 1235.885850] ? memcpy+0x39/0x60 [ 1235.886128] ? getname_kernel+0x21e/0x370 [ 1235.886484] create_local_trace_uprobe+0x86/0x4e0 [ 1235.886890] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1235.887285] ? memdup_user+0x7c/0xd0 [ 1235.887614] perf_uprobe_init+0x136/0x210 [ 1235.887976] perf_uprobe_event_init+0xff/0x1d0 [ 1235.888359] perf_try_init_event+0x130/0x570 [ 1235.888737] perf_event_alloc.part.0+0xd96/0x2b70 [ 1235.889151] __do_sys_perf_event_open+0x579/0x2e60 [ 1235.889596] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1235.890002] ? perf_event_set_output+0x5b0/0x5b0 [ 1235.890403] ? wait_for_completion_io+0x270/0x270 [ 1235.890832] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1235.891270] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1235.891708] do_syscall_64+0x33/0x40 [ 1235.892023] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1235.892455] RIP: 0033:0x7f229d85eb19 [ 1235.892770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1235.894296] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1235.894933] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1235.895528] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1235.896119] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1235.896719] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1235.897326] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1235.936369] FAULT_INJECTION: forcing a failure. [ 1235.936369] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.937623] CPU: 0 PID: 7635 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1235.938196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1235.938889] Call Trace: [ 1235.939124] dump_stack+0x107/0x167 [ 1235.939437] should_fail.cold+0x5/0xa [ 1235.939767] ? find_held_lock+0x2c/0x110 [ 1235.940116] ? create_object.isra.0+0x3a/0xa20 [ 1235.940511] should_failslab+0x5/0x20 [ 1235.940840] kmem_cache_alloc+0x5b/0x310 [ 1235.941191] ? __task_pid_nr_ns+0x16a/0x4f0 [ 1235.941592] create_object.isra.0+0x3a/0xa20 [ 1235.941971] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1235.942411] kmem_cache_alloc_trace+0x151/0x320 [ 1235.942817] ? proc_ns_dir_lookup+0x2c0/0x2c0 [ 1235.943199] proc_self_get_link+0x18b/0x200 [ 1235.943570] step_into+0x1595/0x1ce0 [ 1235.943894] ? lookup_fast+0x6e0/0x6e0 [ 1235.944230] ? try_to_unlazy_next+0x4f0/0x4f0 [ 1235.944620] walk_component+0x171/0x6a0 [ 1235.944960] ? trace_hardirqs_on+0x5b/0x180 [ 1235.945345] ? handle_dots.part.0+0x15c0/0x15c0 [ 1235.945754] ? security_inode_permission+0xcb/0x100 [ 1235.946186] link_path_walk.part.0+0x699/0xbf0 [ 1235.946581] ? walk_component+0x6a0/0x6a0 [ 1235.946942] path_lookupat+0xb7/0x860 [ 1235.947273] filename_lookup+0x1b1/0x570 [ 1235.947626] ? may_linkat+0x230/0x230 [ 1235.947963] ? trace_hardirqs_on+0x5b/0x180 [ 1235.948342] ? memcpy+0x39/0x60 [ 1235.948630] ? getname_kernel+0x21e/0x370 [ 1235.948988] create_local_trace_uprobe+0x86/0x4e0 [ 1235.949437] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1235.949832] ? memdup_user+0x7c/0xd0 [ 1235.950163] perf_uprobe_init+0x136/0x210 [ 1235.950530] perf_uprobe_event_init+0xff/0x1d0 [ 1235.950916] perf_try_init_event+0x130/0x570 [ 1235.951291] perf_event_alloc.part.0+0xd96/0x2b70 [ 1235.951708] __do_sys_perf_event_open+0x579/0x2e60 [ 1235.952136] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1235.952546] ? perf_event_set_output+0x5b0/0x5b0 [ 1235.952959] ? wait_for_completion_io+0x270/0x270 [ 1235.953411] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1235.953860] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1235.954294] do_syscall_64+0x33/0x40 [ 1235.954615] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1235.955043] RIP: 0033:0x7f08909a9b19 [ 1235.955359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1235.956886] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1235.957574] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1235.958173] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1235.958771] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1235.959367] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1235.959965] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:11:38 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1235.968749] FAULT_INJECTION: forcing a failure. [ 1235.968749] name failslab, interval 1, probability 0, space 0, times 0 [ 1235.970127] CPU: 1 PID: 7638 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1235.970918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1235.971788] Call Trace: [ 1235.972037] dump_stack+0x107/0x167 [ 1235.972434] should_fail.cold+0x5/0xa [ 1235.972885] ? selinux_sb_alloc_security+0x41/0x220 [ 1235.973413] should_failslab+0x5/0x20 [ 1235.973852] kmem_cache_alloc_trace+0x55/0x320 [ 1235.974273] ? down_write_nested+0xe4/0x160 [ 1235.974783] selinux_sb_alloc_security+0x41/0x220 [ 1235.975314] security_sb_alloc+0x46/0xa0 [ 1235.975742] ? fput+0x20/0x20 [ 1235.976114] alloc_super+0x1ed/0xa90 [ 1235.976524] ? fput+0x20/0x20 [ 1235.976820] sget_fc+0x110/0x860 [ 1235.977227] ? set_anon_super+0xc0/0xc0 [ 1235.977657] ? rpc_kill_sb+0x1b0/0x1b0 [ 1235.978021] get_tree_keyed+0x55/0x210 [ 1235.978551] vfs_get_tree+0x8e/0x300 [ 1235.978901] path_mount+0x1429/0x2120 [ 1235.979383] ? strncpy_from_user+0x9e/0x470 [ 1235.979791] ? finish_automount+0xa90/0xa90 [ 1235.980193] ? getname_flags.part.0+0x1dd/0x4f0 [ 1235.980753] __x64_sys_mount+0x282/0x300 [ 1235.981133] ? copy_mnt_ns+0xa00/0xa00 [ 1235.981602] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1235.982088] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1235.982720] do_syscall_64+0x33/0x40 [ 1235.983070] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1235.983663] RIP: 0033:0x7fe8bba05b19 [ 1235.984010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1235.985946] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1235.986723] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1235.987501] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1235.988238] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1235.988956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1235.989761] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:11:38 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:38 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1236.055147] blktrace: Concurrent blktraces are not allowed on sg0 02:11:51 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 11) 02:11:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2203, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:51 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 11) [ 1249.544190] FAULT_INJECTION: forcing a failure. [ 1249.544190] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.545245] CPU: 1 PID: 7659 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1249.545897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1249.546775] Call Trace: [ 1249.547007] dump_stack+0x107/0x167 [ 1249.547315] should_fail.cold+0x5/0xa [ 1249.547689] ? alloc_trace_uprobe+0x3d/0x2b0 [ 1249.548065] should_failslab+0x5/0x20 [ 1249.548444] __kmalloc+0x72/0x390 [ 1249.548737] ? memcpy+0x39/0x60 [ 1249.549021] alloc_trace_uprobe+0x3d/0x2b0 [ 1249.549490] create_local_trace_uprobe+0x101/0x4e0 [ 1249.549916] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1249.550321] ? memdup_user+0x7c/0xd0 [ 1249.550699] perf_uprobe_init+0x136/0x210 [ 1249.551062] perf_uprobe_event_init+0xff/0x1d0 [ 1249.551491] perf_try_init_event+0x130/0x570 [ 1249.551865] perf_event_alloc.part.0+0xd96/0x2b70 [ 1249.552278] __do_sys_perf_event_open+0x579/0x2e60 [ 1249.552757] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1249.553162] ? perf_event_set_output+0x5b0/0x5b0 [ 1249.553737] ? wait_for_completion_io+0x270/0x270 [ 1249.554165] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1249.554658] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1249.555106] do_syscall_64+0x33/0x40 [ 1249.555474] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1249.555905] RIP: 0033:0x7f229d85eb19 [ 1249.556219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.557880] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1249.558574] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1249.559170] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1249.559809] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.560552] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1249.561146] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1249.561977] trace_uprobe: Failed to allocate trace_uprobe.(-12) 02:11:51 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 12) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:11:51 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:51 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/120]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1249.568914] FAULT_INJECTION: forcing a failure. [ 1249.568914] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.570036] CPU: 1 PID: 7661 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1249.570710] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1249.571461] Call Trace: [ 1249.571708] dump_stack+0x107/0x167 [ 1249.572043] should_fail.cold+0x5/0xa [ 1249.574263] ? create_object.isra.0+0x3a/0xa20 [ 1249.574748] should_failslab+0x5/0x20 [ 1249.575070] kmem_cache_alloc+0x5b/0x310 [ 1249.575464] create_object.isra.0+0x3a/0xa20 [ 1249.575834] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1249.576264] kmem_cache_alloc_trace+0x151/0x320 [ 1249.576714] ? do_raw_spin_lock+0x121/0x260 [ 1249.577077] ? fput+0x20/0x20 [ 1249.577415] alloc_super+0x52/0xa90 [ 1249.577731] ? fput+0x20/0x20 [ 1249.577993] sget_fc+0x110/0x860 [ 1249.578278] ? set_anon_super+0xc0/0xc0 [ 1249.578692] ? rpc_kill_sb+0x1b0/0x1b0 [ 1249.579019] get_tree_keyed+0x55/0x210 [ 1249.579391] vfs_get_tree+0x8e/0x300 [ 1249.579706] path_mount+0x1429/0x2120 [ 1249.580033] ? strncpy_from_user+0x9e/0x470 [ 1249.580448] ? finish_automount+0xa90/0xa90 [ 1249.580812] ? getname_flags.part.0+0x1dd/0x4f0 [ 1249.581209] __x64_sys_mount+0x282/0x300 [ 1249.581622] ? copy_mnt_ns+0xa00/0xa00 [ 1249.581954] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1249.582470] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1249.582903] do_syscall_64+0x33/0x40 [ 1249.583215] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1249.583690] RIP: 0033:0x7fe8bba05b19 [ 1249.584003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.585642] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1249.586280] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1249.586949] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1249.587589] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.588184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1249.588827] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1249.605611] FAULT_INJECTION: forcing a failure. [ 1249.605611] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.606777] CPU: 1 PID: 7671 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1249.607413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1249.608118] Call Trace: [ 1249.608409] dump_stack+0x107/0x167 [ 1249.608728] should_fail.cold+0x5/0xa [ 1249.609061] ? alloc_trace_uprobe+0x3d/0x2b0 [ 1249.609510] should_failslab+0x5/0x20 [ 1249.609839] __kmalloc+0x72/0x390 [ 1249.610144] ? memcpy+0x39/0x60 [ 1249.610520] alloc_trace_uprobe+0x3d/0x2b0 [ 1249.610887] create_local_trace_uprobe+0x101/0x4e0 [ 1249.611322] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1249.611776] ? memdup_user+0x7c/0xd0 [ 1249.612110] perf_uprobe_init+0x136/0x210 [ 1249.612534] perf_uprobe_event_init+0xff/0x1d0 [ 1249.612927] perf_try_init_event+0x130/0x570 [ 1249.613371] perf_event_alloc.part.0+0xd96/0x2b70 [ 1249.613809] __do_sys_perf_event_open+0x579/0x2e60 [ 1249.614246] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1249.614745] ? perf_event_set_output+0x5b0/0x5b0 [ 1249.615158] ? wait_for_completion_io+0x270/0x270 [ 1249.615649] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1249.616103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1249.616605] do_syscall_64+0x33/0x40 [ 1249.616928] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1249.617431] RIP: 0033:0x7f08909a9b19 [ 1249.617755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.619434] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1249.620086] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1249.620747] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1249.621434] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.622046] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1249.622732] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1249.623454] trace_uprobe: Failed to allocate trace_uprobe.(-12) 02:11:51 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:51 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 13) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:11:51 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1249.651052] blktrace: Concurrent blktraces are not allowed on sg0 [ 1249.718218] FAULT_INJECTION: forcing a failure. [ 1249.718218] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.719255] CPU: 0 PID: 7679 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1249.719830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1249.720523] Call Trace: [ 1249.720756] dump_stack+0x107/0x167 [ 1249.721069] should_fail.cold+0x5/0xa [ 1249.721416] ? selinux_sb_alloc_security+0x41/0x220 [ 1249.721845] should_failslab+0x5/0x20 [ 1249.722173] kmem_cache_alloc_trace+0x55/0x320 [ 1249.722561] ? down_write_nested+0xe4/0x160 [ 1249.722932] selinux_sb_alloc_security+0x41/0x220 [ 1249.723349] security_sb_alloc+0x46/0xa0 [ 1249.723696] ? fput+0x20/0x20 [ 1249.723963] alloc_super+0x1ed/0xa90 [ 1249.724281] ? fput+0x20/0x20 [ 1249.724549] sget_fc+0x110/0x860 [ 1249.724837] ? set_anon_super+0xc0/0xc0 [ 1249.725179] ? rpc_kill_sb+0x1b0/0x1b0 [ 1249.725522] get_tree_keyed+0x55/0x210 [ 1249.725854] vfs_get_tree+0x8e/0x300 [ 1249.726172] path_mount+0x1429/0x2120 [ 1249.726505] ? strncpy_from_user+0x9e/0x470 [ 1249.726873] ? finish_automount+0xa90/0xa90 [ 1249.727242] ? getname_flags.part.0+0x1dd/0x4f0 [ 1249.727645] __x64_sys_mount+0x282/0x300 [ 1249.727992] ? copy_mnt_ns+0xa00/0xa00 [ 1249.728330] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1249.728779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1249.729219] do_syscall_64+0x33/0x40 [ 1249.729548] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1249.729983] RIP: 0033:0x7fe8bba05b19 [ 1249.730300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.731850] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1249.732494] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 02:11:52 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 12) 02:11:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2205, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:52 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 12) 02:11:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/120]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1249.733092] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1249.733706] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.734306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1249.734905] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:11:52 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1249.783520] FAULT_INJECTION: forcing a failure. [ 1249.783520] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.784576] CPU: 1 PID: 7684 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1249.785162] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1249.785899] Call Trace: [ 1249.786142] dump_stack+0x107/0x167 [ 1249.786464] should_fail.cold+0x5/0xa [ 1249.786799] ? create_object.isra.0+0x3a/0xa20 [ 1249.787203] should_failslab+0x5/0x20 [ 1249.787543] kmem_cache_alloc+0x5b/0x310 [ 1249.787901] create_object.isra.0+0x3a/0xa20 [ 1249.788286] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1249.788737] __kmalloc+0x16e/0x390 [ 1249.789066] alloc_trace_uprobe+0x3d/0x2b0 [ 1249.789455] create_local_trace_uprobe+0x101/0x4e0 [ 1249.789879] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1249.790291] ? memdup_user+0x7c/0xd0 [ 1249.790628] perf_uprobe_init+0x136/0x210 [ 1249.791000] perf_uprobe_event_init+0xff/0x1d0 [ 1249.791399] perf_try_init_event+0x130/0x570 [ 1249.791790] perf_event_alloc.part.0+0xd96/0x2b70 [ 1249.792221] __do_sys_perf_event_open+0x579/0x2e60 [ 1249.792662] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1249.793084] ? perf_event_set_output+0x5b0/0x5b0 [ 1249.793513] ? wait_for_completion_io+0x270/0x270 [ 1249.793956] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1249.794412] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1249.794860] do_syscall_64+0x33/0x40 [ 1249.795189] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1249.795633] RIP: 0033:0x7f229d85eb19 [ 1249.795957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.797542] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1249.798201] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1249.798818] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1249.799433] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.800046] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1249.800658] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1249.802249] FAULT_INJECTION: forcing a failure. [ 1249.802249] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.803276] CPU: 0 PID: 7689 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1249.803853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1249.804548] Call Trace: [ 1249.804781] dump_stack+0x107/0x167 [ 1249.805095] should_fail.cold+0x5/0xa [ 1249.805445] ? create_object.isra.0+0x3a/0xa20 [ 1249.805839] should_failslab+0x5/0x20 [ 1249.806168] kmem_cache_alloc+0x5b/0x310 [ 1249.806519] create_object.isra.0+0x3a/0xa20 [ 1249.806900] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1249.807338] __kmalloc+0x16e/0x390 [ 1249.807645] ? memcpy+0x39/0x60 [ 1249.807941] alloc_trace_uprobe+0x3d/0x2b0 [ 1249.808306] create_local_trace_uprobe+0x101/0x4e0 [ 1249.808727] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1249.809133] ? memdup_user+0x7c/0xd0 [ 1249.809479] perf_uprobe_init+0x136/0x210 [ 1249.809844] perf_uprobe_event_init+0xff/0x1d0 [ 1249.810233] perf_try_init_event+0x130/0x570 [ 1249.810614] perf_event_alloc.part.0+0xd96/0x2b70 [ 1249.811035] __do_sys_perf_event_open+0x579/0x2e60 [ 1249.811466] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1249.811878] ? perf_event_set_output+0x5b0/0x5b0 [ 1249.812282] ? wait_for_completion_io+0x270/0x270 [ 1249.812716] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1249.813162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1249.813621] do_syscall_64+0x33/0x40 [ 1249.813942] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1249.814377] RIP: 0033:0x7f08909a9b19 [ 1249.814696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.816242] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 02:11:52 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1249.816889] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1249.817508] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1249.818108] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.818709] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1249.819310] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:11:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2270, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:11:52 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:11:52 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 14) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:11:52 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:11:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:11:52 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 13) [ 1249.968792] FAULT_INJECTION: forcing a failure. [ 1249.968792] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.969842] CPU: 0 PID: 7708 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1249.970421] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1249.971115] Call Trace: [ 1249.971348] dump_stack+0x107/0x167 [ 1249.971661] should_fail.cold+0x5/0xa [ 1249.971992] ? create_object.isra.0+0x3a/0xa20 [ 1249.972387] should_failslab+0x5/0x20 [ 1249.972716] kmem_cache_alloc+0x5b/0x310 [ 1249.973066] ? mark_held_locks+0x9e/0xe0 [ 1249.973433] create_object.isra.0+0x3a/0xa20 [ 1249.973817] kmemleak_alloc_percpu+0xa0/0x100 [ 1249.974207] pcpu_alloc+0x4e2/0x1240 [ 1249.974539] __percpu_init_rwsem+0x22/0x150 [ 1249.974909] alloc_super+0x232/0xa90 [ 1249.975234] ? fput+0x20/0x20 [ 1249.975503] sget_fc+0x110/0x860 [ 1249.975793] ? set_anon_super+0xc0/0xc0 [ 1249.976135] ? rpc_kill_sb+0x1b0/0x1b0 [ 1249.976469] get_tree_keyed+0x55/0x210 [ 1249.976802] vfs_get_tree+0x8e/0x300 [ 1249.977120] path_mount+0x1429/0x2120 [ 1249.977504] ? strncpy_from_user+0x9e/0x470 [ 1249.977873] ? finish_automount+0xa90/0xa90 [ 1249.978241] ? getname_flags.part.0+0x1dd/0x4f0 [ 1249.978644] __x64_sys_mount+0x282/0x300 [ 1249.978991] ? copy_mnt_ns+0xa00/0xa00 [ 1249.979328] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1249.979775] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1249.980213] do_syscall_64+0x33/0x40 [ 1249.980535] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1249.980970] RIP: 0033:0x7fe8bba05b19 [ 1249.981288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.982878] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1249.983524] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1249.984126] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1249.984728] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.985359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1249.985974] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:11:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1250.034530] FAULT_INJECTION: forcing a failure. [ 1250.034530] name failslab, interval 1, probability 0, space 0, times 0 [ 1250.035534] CPU: 0 PID: 7715 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1250.036104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1250.036799] Call Trace: [ 1250.037030] dump_stack+0x107/0x167 [ 1250.037349] should_fail.cold+0x5/0xa [ 1250.037698] ? trace_probe_init+0x6a/0x4e0 [ 1250.038065] should_failslab+0x5/0x20 [ 1250.038390] __kmalloc+0x72/0x390 [ 1250.038687] ? trace_hardirqs_on+0x5b/0x180 [ 1250.039062] trace_probe_init+0x6a/0x4e0 [ 1250.039417] alloc_trace_uprobe+0x63/0x2b0 [ 1250.039780] create_local_trace_uprobe+0x101/0x4e0 [ 1250.040202] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1250.040602] ? memdup_user+0x7c/0xd0 [ 1250.040932] perf_uprobe_init+0x136/0x210 [ 1250.041307] perf_uprobe_event_init+0xff/0x1d0 [ 1250.041708] perf_try_init_event+0x130/0x570 [ 1250.042098] perf_event_alloc.part.0+0xd96/0x2b70 [ 1250.042119] __do_sys_perf_event_open+0x579/0x2e60 [ 1250.042141] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1250.042154] ? perf_event_set_output+0x5b0/0x5b0 [ 1250.042166] ? wait_for_completion_io+0x270/0x270 [ 1250.042195] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1250.042206] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1250.042219] do_syscall_64+0x33/0x40 [ 1250.042232] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1250.042239] RIP: 0033:0x7f229d85eb19 [ 1250.042250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1250.042256] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1250.042269] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1250.042276] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1250.042282] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1250.042289] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1250.042296] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1250.042423] trace_uprobe: Failed to allocate trace_uprobe.(-12) 02:12:05 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 13) 02:12:05 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2271, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:05 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 14) 02:12:05 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:12:05 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:12:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:12:05 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 15) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1263.012857] FAULT_INJECTION: forcing a failure. [ 1263.012857] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.014028] CPU: 1 PID: 7737 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1263.014642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1263.015382] Call Trace: [ 1263.015635] dump_stack+0x107/0x167 [ 1263.015974] should_fail.cold+0x5/0xa [ 1263.016332] ? create_object.isra.0+0x3a/0xa20 [ 1263.016760] should_failslab+0x5/0x20 [ 1263.017119] kmem_cache_alloc+0x5b/0x310 [ 1263.017587] FAULT_INJECTION: forcing a failure. [ 1263.017587] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.021507] ? __kmalloc+0x16e/0x390 [ 1263.021526] create_object.isra.0+0x3a/0xa20 [ 1263.021542] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1263.021560] __kmalloc+0x16e/0x390 [ 1263.021572] ? trace_hardirqs_on+0x5b/0x180 [ 1263.021597] trace_probe_init+0x6a/0x4e0 [ 1263.024573] alloc_trace_uprobe+0x63/0x2b0 [ 1263.024931] create_local_trace_uprobe+0x101/0x4e0 [ 1263.025361] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1263.025784] ? memdup_user+0x7c/0xd0 [ 1263.026110] perf_uprobe_init+0x136/0x210 [ 1263.026479] perf_uprobe_event_init+0xff/0x1d0 [ 1263.026863] perf_try_init_event+0x130/0x570 [ 1263.027238] perf_event_alloc.part.0+0xd96/0x2b70 [ 1263.027660] __do_sys_perf_event_open+0x579/0x2e60 [ 1263.028088] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1263.028500] ? perf_event_set_output+0x5b0/0x5b0 [ 1263.028899] ? wait_for_completion_io+0x270/0x270 [ 1263.029329] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.029790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1263.030226] do_syscall_64+0x33/0x40 [ 1263.030548] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1263.030979] RIP: 0033:0x7f229d85eb19 [ 1263.031296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.032824] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1263.033481] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1263.034078] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1263.034677] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1263.035271] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1263.035872] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1263.036528] CPU: 0 PID: 7743 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1263.037195] FAULT_INJECTION: forcing a failure. [ 1263.037195] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.037273] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1263.037281] Call Trace: [ 1263.039498] dump_stack+0x107/0x167 [ 1263.039883] should_fail.cold+0x5/0xa [ 1263.040285] ? trace_probe_init+0x6a/0x4e0 [ 1263.040719] should_failslab+0x5/0x20 [ 1263.041118] __kmalloc+0x72/0x390 [ 1263.041750] ? trace_hardirqs_on+0x5b/0x180 [ 1263.042522] trace_probe_init+0x6a/0x4e0 [ 1263.043237] alloc_trace_uprobe+0x63/0x2b0 [ 1263.043985] create_local_trace_uprobe+0x101/0x4e0 [ 1263.044852] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1263.045745] ? memdup_user+0x7c/0xd0 [ 1263.046393] perf_uprobe_init+0x136/0x210 [ 1263.047113] perf_uprobe_event_init+0xff/0x1d0 [ 1263.047906] perf_try_init_event+0x130/0x570 [ 1263.048675] perf_event_alloc.part.0+0xd96/0x2b70 [ 1263.049498] __do_sys_perf_event_open+0x579/0x2e60 [ 1263.049913] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1263.050316] ? perf_event_set_output+0x5b0/0x5b0 [ 1263.050711] ? wait_for_completion_io+0x270/0x270 [ 1263.051126] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.051561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1263.051991] do_syscall_64+0x33/0x40 [ 1263.052301] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1263.052726] RIP: 0033:0x7f08909a9b19 [ 1263.053037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.054658] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1263.055290] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1263.055885] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1263.056478] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1263.057071] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1263.058136] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1263.059399] CPU: 1 PID: 7741 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1263.060142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1263.061037] Call Trace: [ 1263.061329] dump_stack+0x107/0x167 [ 1263.061719] should_fail.cold+0x5/0xa [ 1263.062140] ? create_object.isra.0+0x3a/0xa20 [ 1263.062641] should_failslab+0x5/0x20 [ 1263.063059] kmem_cache_alloc+0x5b/0x310 [ 1263.063507] create_object.isra.0+0x3a/0xa20 [ 1263.063995] kmemleak_alloc_percpu+0xa0/0x100 [ 1263.064491] pcpu_alloc+0x4e2/0x1240 [ 1263.064917] __percpu_init_rwsem+0x22/0x150 [ 1263.065402] alloc_super+0x232/0xa90 [ 1263.065791] ? fput+0x20/0x20 [ 1263.066137] sget_fc+0x110/0x860 [ 1263.066197] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1263.066504] ? set_anon_super+0xc0/0xc0 [ 1263.066520] ? rpc_kill_sb+0x1b0/0x1b0 [ 1263.066533] get_tree_keyed+0x55/0x210 [ 1263.066548] vfs_get_tree+0x8e/0x300 [ 1263.066560] path_mount+0x1429/0x2120 [ 1263.066580] ? strncpy_from_user+0x9e/0x470 [ 1263.066594] ? finish_automount+0xa90/0xa90 [ 1263.066608] ? getname_flags.part.0+0x1dd/0x4f0 [ 1263.066634] __x64_sys_mount+0x282/0x300 [ 1263.074829] ? copy_mnt_ns+0xa00/0xa00 [ 1263.075595] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.076601] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1263.077626] do_syscall_64+0x33/0x40 [ 1263.078364] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1263.079381] RIP: 0033:0x7fe8bba05b19 [ 1263.080125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.084289] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1263.085842] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1263.087232] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1263.088622] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1263.090185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1263.091545] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1263.100520] blktrace: Concurrent blktraces are not allowed on sg0 [ 1263.101231] blktrace: Concurrent blktraces are not allowed on sg0 02:12:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:12:05 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 16) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1263.229187] FAULT_INJECTION: forcing a failure. [ 1263.229187] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.230458] CPU: 0 PID: 7754 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1263.231198] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1263.232105] Call Trace: [ 1263.232406] dump_stack+0x107/0x167 [ 1263.232812] should_fail.cold+0x5/0xa [ 1263.233239] ? create_object.isra.0+0x3a/0xa20 [ 1263.233707] should_failslab+0x5/0x20 [ 1263.234062] kmem_cache_alloc+0x5b/0x310 [ 1263.234442] ? mark_held_locks+0x9e/0xe0 [ 1263.234818] create_object.isra.0+0x3a/0xa20 [ 1263.235209] kmemleak_alloc_percpu+0xa0/0x100 [ 1263.235597] pcpu_alloc+0x4e2/0x1240 [ 1263.235928] __percpu_init_rwsem+0x22/0x150 [ 1263.236296] alloc_super+0x232/0xa90 [ 1263.236618] ? fput+0x20/0x20 [ 1263.236883] sget_fc+0x110/0x860 [ 1263.237167] ? set_anon_super+0xc0/0xc0 [ 1263.237522] ? rpc_kill_sb+0x1b0/0x1b0 [ 1263.237850] get_tree_keyed+0x55/0x210 [ 1263.238180] vfs_get_tree+0x8e/0x300 [ 1263.238502] path_mount+0x1429/0x2120 [ 1263.238835] ? strncpy_from_user+0x9e/0x470 [ 1263.239196] ? finish_automount+0xa90/0xa90 [ 1263.239565] ? getname_flags.part.0+0x1dd/0x4f0 [ 1263.239962] __x64_sys_mount+0x282/0x300 [ 1263.240303] ? copy_mnt_ns+0xa00/0xa00 [ 1263.240641] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.241080] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1263.241532] do_syscall_64+0x33/0x40 [ 1263.241847] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1263.242275] RIP: 0033:0x7fe8bba05b19 [ 1263.242592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.244104] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1263.244743] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1263.245332] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1263.249945] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1263.250535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1263.251120] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1276.807834] blktrace: Concurrent blktraces are not allowed on sg0 [ 1276.817211] FAULT_INJECTION: forcing a failure. [ 1276.817211] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.818304] CPU: 1 PID: 7772 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1276.818314] FAULT_INJECTION: forcing a failure. [ 1276.818314] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.819791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1276.820485] Call Trace: [ 1276.820724] dump_stack+0x107/0x167 [ 1276.821035] should_fail.cold+0x5/0xa [ 1276.821363] ? create_object.isra.0+0x3a/0xa20 [ 1276.825768] should_failslab+0x5/0x20 [ 1276.826095] kmem_cache_alloc+0x5b/0x310 [ 1276.826440] ? mark_held_locks+0x9e/0xe0 [ 1276.826783] create_object.isra.0+0x3a/0xa20 [ 1276.827161] kmemleak_alloc_percpu+0xa0/0x100 [ 1276.827542] pcpu_alloc+0x4e2/0x1240 [ 1276.827870] __percpu_init_rwsem+0x22/0x150 [ 1276.828233] alloc_super+0x232/0xa90 [ 1276.828547] ? fput+0x20/0x20 [ 1276.828810] sget_fc+0x110/0x860 [ 1276.829094] ? set_anon_super+0xc0/0xc0 [ 1276.829429] ? rpc_kill_sb+0x1b0/0x1b0 [ 1276.829776] get_tree_keyed+0x55/0x210 [ 1276.830105] vfs_get_tree+0x8e/0x300 [ 1276.830418] path_mount+0x1429/0x2120 [ 1276.830752] ? strncpy_from_user+0x9e/0x470 [ 1276.831113] ? finish_automount+0xa90/0xa90 [ 1276.831475] ? getname_flags.part.0+0x1dd/0x4f0 [ 1276.831872] __x64_sys_mount+0x282/0x300 [ 1276.832211] ? copy_mnt_ns+0xa00/0xa00 [ 1276.832541] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1276.832978] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1276.833410] do_syscall_64+0x33/0x40 [ 1276.833742] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1276.834171] RIP: 0033:0x7fe8bba05b19 [ 1276.834486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.836016] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1276.836659] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1276.837254] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1276.837863] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1276.838457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1276.839052] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1276.839665] CPU: 0 PID: 7777 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1276.840246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1276.840936] Call Trace: [ 1276.841160] dump_stack+0x107/0x167 [ 1276.841469] should_fail.cold+0x5/0xa [ 1276.841803] ? create_object.isra.0+0x3a/0xa20 [ 1276.842189] should_failslab+0x5/0x20 [ 1276.842515] kmem_cache_alloc+0x5b/0x310 [ 1276.842705] FAULT_INJECTION: forcing a failure. [ 1276.842705] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.842860] ? __kmalloc+0x16e/0x390 [ 1276.842875] create_object.isra.0+0x3a/0xa20 [ 1276.844445] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1276.844874] __kmalloc+0x16e/0x390 [ 1276.845182] trace_probe_init+0x6a/0x4e0 [ 1276.845547] alloc_trace_uprobe+0x63/0x2b0 [ 1276.845917] create_local_trace_uprobe+0x101/0x4e0 [ 1276.846327] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1276.846717] ? memdup_user+0x7c/0xd0 [ 1276.847034] perf_uprobe_init+0x136/0x210 [ 1276.847385] perf_uprobe_event_init+0xff/0x1d0 [ 1276.847766] perf_try_init_event+0x130/0x570 [ 1276.848135] perf_event_alloc.part.0+0xd96/0x2b70 [ 1276.848544] __do_sys_perf_event_open+0x579/0x2e60 [ 1276.848959] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1276.849361] ? perf_event_set_output+0x5b0/0x5b0 [ 1276.849837] ? wait_for_completion_io+0x270/0x270 [ 1276.850254] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1276.850690] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1276.851121] do_syscall_64+0x33/0x40 [ 1276.851433] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1276.851858] RIP: 0033:0x7f08909a9b19 [ 1276.852170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.853696] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1276.854330] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1276.854923] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1276.855516] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1276.856108] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1276.856701] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:12:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:12:19 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 17) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:12:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2272, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:12:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:19 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 14) 02:12:19 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:12:19 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 15) [ 1276.857311] CPU: 1 PID: 7776 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1276.865928] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1276.866620] Call Trace: [ 1276.866845] dump_stack+0x107/0x167 [ 1276.867162] should_fail.cold+0x5/0xa [ 1276.867488] should_failslab+0x5/0x20 [ 1276.867809] __kmalloc_track_caller+0x79/0x370 [ 1276.868193] ? trace_probe_init+0x227/0x4e0 [ 1276.868561] kstrdup+0x36/0x70 [ 1276.868842] trace_probe_init+0x227/0x4e0 [ 1276.869196] alloc_trace_uprobe+0x63/0x2b0 [ 1276.869583] create_local_trace_uprobe+0x101/0x4e0 [ 1276.869996] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1276.870385] ? memdup_user+0x7c/0xd0 [ 1276.870702] perf_uprobe_init+0x136/0x210 [ 1276.871056] perf_uprobe_event_init+0xff/0x1d0 [ 1276.871439] perf_try_init_event+0x130/0x570 [ 1276.871809] perf_event_alloc.part.0+0xd96/0x2b70 [ 1276.872222] __do_sys_perf_event_open+0x579/0x2e60 [ 1276.872640] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1276.873058] ? perf_event_set_output+0x5b0/0x5b0 [ 1276.873457] ? wait_for_completion_io+0x270/0x270 [ 1276.873892] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1276.874333] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1276.874767] do_syscall_64+0x33/0x40 [ 1276.875082] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1276.875510] RIP: 0033:0x7f229d85eb19 [ 1276.875823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1276.877353] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1276.878007] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1276.878602] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1276.879197] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1276.879792] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1276.880388] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1276.881800] trace_uprobe: Failed to allocate trace_uprobe.(-12) 02:12:19 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 18) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:12:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:12:19 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:12:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2275, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001600)) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1276.985206] FAULT_INJECTION: forcing a failure. [ 1276.985206] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.987874] CPU: 1 PID: 7791 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1276.988447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1276.989144] Call Trace: [ 1276.989378] dump_stack+0x107/0x167 [ 1276.989706] should_fail.cold+0x5/0xa [ 1276.990034] ? create_object.isra.0+0x3a/0xa20 [ 1276.990429] should_failslab+0x5/0x20 [ 1276.990759] kmem_cache_alloc+0x5b/0x310 [ 1276.991107] ? mark_held_locks+0x9e/0xe0 [ 1276.991456] create_object.isra.0+0x3a/0xa20 [ 1276.991840] kmemleak_alloc_percpu+0xa0/0x100 [ 1276.992229] pcpu_alloc+0x4e2/0x1240 [ 1276.992558] __percpu_init_rwsem+0x22/0x150 [ 1276.992928] alloc_super+0x232/0xa90 [ 1276.993246] ? fput+0x20/0x20 [ 1276.993521] sget_fc+0x110/0x860 [ 1276.993818] ? set_anon_super+0xc0/0xc0 [ 1276.994158] ? rpc_kill_sb+0x1b0/0x1b0 [ 1276.994491] get_tree_keyed+0x55/0x210 [ 1276.994829] vfs_get_tree+0x8e/0x300 [ 1276.995153] path_mount+0x1429/0x2120 [ 1276.995485] ? strncpy_from_user+0x9e/0x470 [ 1276.995856] ? finish_automount+0xa90/0xa90 [ 1276.996229] ? getname_flags.part.0+0x1dd/0x4f0 [ 1276.996638] __x64_sys_mount+0x282/0x300 [ 1276.996987] ? copy_mnt_ns+0xa00/0xa00 [ 1276.997327] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1276.997814] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1276.998302] do_syscall_64+0x33/0x40 [ 1276.998627] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1276.999063] RIP: 0033:0x7fe8bba05b19 [ 1276.999380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1277.000941] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1277.001623] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1277.002215] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1277.002806] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1277.003398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1277.003989] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:12:19 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1277.052347] blktrace: Concurrent blktraces are not allowed on sg0 02:12:32 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 16) 02:12:32 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 15) [ 1289.935127] FAULT_INJECTION: forcing a failure. [ 1289.935127] name failslab, interval 1, probability 0, space 0, times 0 [ 1289.936445] CPU: 1 PID: 7805 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1289.937053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1289.937803] Call Trace: [ 1289.938052] dump_stack+0x107/0x167 [ 1289.938387] should_fail.cold+0x5/0xa [ 1289.938747] should_failslab+0x5/0x20 [ 1289.939099] __kmalloc_track_caller+0x79/0x370 [ 1289.939522] ? trace_probe_init+0x227/0x4e0 [ 1289.939933] kstrdup+0x36/0x70 [ 1289.940242] trace_probe_init+0x227/0x4e0 [ 1289.940636] alloc_trace_uprobe+0x63/0x2b0 [ 1289.941030] create_local_trace_uprobe+0x101/0x4e0 [ 1289.941484] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1289.941928] ? memdup_user+0x7c/0xd0 [ 1289.942282] perf_uprobe_init+0x136/0x210 [ 1289.942679] perf_uprobe_event_init+0xff/0x1d0 [ 1289.943098] perf_try_init_event+0x130/0x570 [ 1289.943503] perf_event_alloc.part.0+0xd96/0x2b70 [ 1289.943951] __do_sys_perf_event_open+0x579/0x2e60 [ 1289.944413] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1289.944851] ? perf_event_set_output+0x5b0/0x5b0 [ 1289.945278] ? wait_for_completion_io+0x270/0x270 [ 1289.945757] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1289.946235] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1289.946711] do_syscall_64+0x33/0x40 [ 1289.947063] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1289.947537] RIP: 0033:0x7f08909a9b19 02:12:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:12:32 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:12:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:12:32 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2276, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:32 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 19) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1289.947884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1289.957628] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1289.958328] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1289.958970] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1289.959618] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1289.960262] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1289.960906] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1289.961684] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1289.965040] blktrace: Concurrent blktraces are not allowed on sg0 [ 1289.966092] FAULT_INJECTION: forcing a failure. [ 1289.966092] name failslab, interval 1, probability 0, space 0, times 0 [ 1289.967188] CPU: 1 PID: 7806 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1289.967796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1289.968528] Call Trace: [ 1289.968770] dump_stack+0x107/0x167 [ 1289.969103] should_fail.cold+0x5/0xa [ 1289.969455] ? create_object.isra.0+0x3a/0xa20 [ 1289.969886] should_failslab+0x5/0x20 [ 1289.970233] kmem_cache_alloc+0x5b/0x310 [ 1289.970602] ? lock_downgrade+0x6d0/0x6d0 [ 1289.970984] create_object.isra.0+0x3a/0xa20 [ 1289.971389] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1289.971854] __kmalloc_track_caller+0x177/0x370 [ 1289.972280] ? trace_probe_init+0x227/0x4e0 [ 1289.972687] kstrdup+0x36/0x70 [ 1289.972994] trace_probe_init+0x227/0x4e0 [ 1289.973383] alloc_trace_uprobe+0x63/0x2b0 [ 1289.973789] create_local_trace_uprobe+0x101/0x4e0 [ 1289.974239] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1289.974669] ? memdup_user+0x7c/0xd0 [ 1289.975017] perf_uprobe_init+0x136/0x210 [ 1289.975401] perf_uprobe_event_init+0xff/0x1d0 [ 1289.975824] perf_try_init_event+0x130/0x570 [ 1289.976229] perf_event_alloc.part.0+0xd96/0x2b70 [ 1289.976689] __do_sys_perf_event_open+0x579/0x2e60 [ 1289.977142] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1289.977592] ? perf_event_set_output+0x5b0/0x5b0 [ 1289.978032] ? wait_for_completion_io+0x270/0x270 [ 1289.978487] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1289.978958] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1289.979431] do_syscall_64+0x33/0x40 [ 1289.979776] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1289.980246] RIP: 0033:0x7f229d85eb19 [ 1289.980605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1289.986273] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1289.986965] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1289.987616] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1289.988259] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1289.988897] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1289.989549] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:12:32 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1289.994785] FAULT_INJECTION: forcing a failure. [ 1289.994785] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.005994] CPU: 1 PID: 7818 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1290.006608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1290.007350] Call Trace: [ 1290.007602] dump_stack+0x107/0x167 [ 1290.007937] should_fail.cold+0x5/0xa [ 1290.008296] ? create_object.isra.0+0x3a/0xa20 [ 1290.008724] should_failslab+0x5/0x20 [ 1290.009076] kmem_cache_alloc+0x5b/0x310 [ 1290.009456] create_object.isra.0+0x3a/0xa20 [ 1290.009878] kmemleak_alloc_percpu+0xa0/0x100 [ 1290.010287] pcpu_alloc+0x4e2/0x1240 [ 1290.010649] __percpu_init_rwsem+0x22/0x150 [ 1290.011051] alloc_super+0x232/0xa90 [ 1290.011396] ? fput+0x20/0x20 [ 1290.011706] sget_fc+0x110/0x860 [ 1290.012026] ? set_anon_super+0xc0/0xc0 [ 1290.012394] ? rpc_kill_sb+0x1b0/0x1b0 [ 1290.012762] get_tree_keyed+0x55/0x210 [ 1290.013121] vfs_get_tree+0x8e/0x300 02:12:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1290.013461] path_mount+0x1429/0x2120 [ 1290.013836] ? strncpy_from_user+0x9e/0x470 [ 1290.014241] ? finish_automount+0xa90/0xa90 [ 1290.014645] ? getname_flags.part.0+0x1dd/0x4f0 [ 1290.015090] __x64_sys_mount+0x282/0x300 [ 1290.015470] ? copy_mnt_ns+0xa00/0xa00 [ 1290.015836] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1290.016312] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1290.016773] do_syscall_64+0x33/0x40 [ 1290.025802] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1290.026267] RIP: 0033:0x7fe8bba05b19 [ 1290.026616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1290.028272] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1290.028967] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1290.029656] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1290.030310] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1290.030964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1290.031612] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:12:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:12:45 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:12:45 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 17) 02:12:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:12:45 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:45 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2279, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(0x0, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:12:45 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 20) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:12:45 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 16) [ 1303.680009] FAULT_INJECTION: forcing a failure. [ 1303.680009] name failslab, interval 1, probability 0, space 0, times 0 02:12:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1303.681178] CPU: 0 PID: 7845 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1303.681892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1303.682646] Call Trace: [ 1303.682966] dump_stack+0x107/0x167 [ 1303.683333] should_fail.cold+0x5/0xa [ 1303.683713] ? create_object.isra.0+0x3a/0xa20 [ 1303.684226] should_failslab+0x5/0x20 [ 1303.684574] kmem_cache_alloc+0x5b/0x310 [ 1303.684998] ? mark_held_locks+0x9e/0xe0 [ 1303.685371] create_object.isra.0+0x3a/0xa20 [ 1303.685945] kmemleak_alloc_percpu+0xa0/0x100 [ 1303.686367] pcpu_alloc+0x4e2/0x1240 [ 1303.686721] __percpu_init_rwsem+0x22/0x150 [ 1303.687191] alloc_super+0x232/0xa90 [ 1303.687536] ? fput+0x20/0x20 [ 1303.687934] sget_fc+0x110/0x860 [ 1303.688243] ? set_anon_super+0xc0/0xc0 [ 1303.688608] ? rpc_kill_sb+0x1b0/0x1b0 [ 1303.689040] get_tree_keyed+0x55/0x210 [ 1303.689396] vfs_get_tree+0x8e/0x300 [ 1303.689738] path_mount+0x1429/0x2120 [ 1303.690188] ? strncpy_from_user+0x9e/0x470 [ 1303.690583] ? finish_automount+0xa90/0xa90 [ 1303.691264] ? getname_flags.part.0+0x1dd/0x4f0 [ 1303.692183] __x64_sys_mount+0x282/0x300 [ 1303.693016] ? copy_mnt_ns+0xa00/0xa00 [ 1303.693752] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1303.694827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1303.695857] do_syscall_64+0x33/0x40 [ 1303.696570] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1303.697585] RIP: 0033:0x7fe8bba05b19 [ 1303.698518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.702195] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1303.703703] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1303.705129] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1303.706695] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1303.708143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1303.709496] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1303.727191] FAULT_INJECTION: forcing a failure. [ 1303.727191] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.729658] CPU: 0 PID: 7844 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1303.734324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1303.734329] Call Trace: [ 1303.734348] dump_stack+0x107/0x167 [ 1303.734362] should_fail.cold+0x5/0xa [ 1303.734388] should_failslab+0x5/0x20 [ 1303.737260] __kmalloc_track_caller+0x79/0x370 [ 1303.737764] ? trace_probe_init+0x284/0x4e0 [ 1303.738291] kstrdup+0x36/0x70 [ 1303.738644] trace_probe_init+0x284/0x4e0 [ 1303.739182] alloc_trace_uprobe+0x63/0x2b0 [ 1303.739640] create_local_trace_uprobe+0x101/0x4e0 [ 1303.740218] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1303.740716] ? memdup_user+0x7c/0xd0 [ 1303.741178] perf_uprobe_init+0x136/0x210 [ 1303.741639] perf_uprobe_event_init+0xff/0x1d0 [ 1303.742162] perf_try_init_event+0x130/0x570 [ 1303.742644] perf_event_alloc.part.0+0xd96/0x2b70 [ 1303.743260] __do_sys_perf_event_open+0x579/0x2e60 [ 1303.743845] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1303.744376] ? perf_event_set_output+0x5b0/0x5b0 [ 1303.744939] ? wait_for_completion_io+0x270/0x270 [ 1303.745481] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1303.746084] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1303.746639] do_syscall_64+0x33/0x40 [ 1303.747091] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1303.747639] RIP: 0033:0x7f229d85eb19 [ 1303.748128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.750167] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1303.751032] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1303.751885] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1303.752654] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1303.753503] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1303.754440] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1303.755470] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1303.760965] FAULT_INJECTION: forcing a failure. [ 1303.760965] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.762328] CPU: 0 PID: 7853 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1303.763111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1303.764039] Call Trace: [ 1303.764325] dump_stack+0x107/0x167 [ 1303.764721] should_fail.cold+0x5/0xa [ 1303.765210] ? create_object.isra.0+0x3a/0xa20 [ 1303.765707] should_failslab+0x5/0x20 [ 1303.766146] kmem_cache_alloc+0x5b/0x310 [ 1303.766579] ? lock_downgrade+0x6d0/0x6d0 [ 1303.767089] create_object.isra.0+0x3a/0xa20 [ 1303.767566] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1303.768167] __kmalloc_track_caller+0x177/0x370 [ 1303.768670] ? trace_probe_init+0x227/0x4e0 [ 1303.769226] kstrdup+0x36/0x70 [ 1303.769580] trace_probe_init+0x227/0x4e0 [ 1303.770074] alloc_trace_uprobe+0x63/0x2b0 [ 1303.770533] create_local_trace_uprobe+0x101/0x4e0 [ 1303.771117] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1303.771615] ? memdup_user+0x7c/0xd0 [ 1303.772078] perf_uprobe_init+0x136/0x210 [ 1303.772537] perf_uprobe_event_init+0xff/0x1d0 [ 1303.773109] perf_try_init_event+0x130/0x570 [ 1303.773588] perf_event_alloc.part.0+0xd96/0x2b70 [ 1303.774149] __do_sys_perf_event_open+0x579/0x2e60 [ 1303.774688] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1303.775262] ? perf_event_set_output+0x5b0/0x5b0 [ 1303.775770] ? wait_for_completion_io+0x270/0x270 [ 1303.776365] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1303.776978] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1303.777538] do_syscall_64+0x33/0x40 [ 1303.777989] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1303.778449] RIP: 0033:0x7f08909a9b19 [ 1303.778830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.780515] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1303.781245] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1303.781997] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1303.782764] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1303.783575] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1303.784391] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:12:46 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:12:46 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 21) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:12:46 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 18) [ 1303.868311] blktrace: Concurrent blktraces are not allowed on sg0 [ 1303.882997] FAULT_INJECTION: forcing a failure. [ 1303.882997] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.884282] CPU: 0 PID: 7863 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1303.885020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1303.885936] Call Trace: [ 1303.886215] dump_stack+0x107/0x167 [ 1303.886586] should_fail.cold+0x5/0xa [ 1303.887035] ? prealloc_shrinker+0xb0/0x2f0 [ 1303.887479] should_failslab+0x5/0x20 [ 1303.887925] __kmalloc+0x72/0x390 [ 1303.888278] prealloc_shrinker+0xb0/0x2f0 [ 1303.888712] ? __init_rwsem+0x129/0x1b0 [ 1303.889176] alloc_super+0x863/0xa90 [ 1303.889566] ? fput+0x20/0x20 [ 1303.889949] sget_fc+0x110/0x860 [ 1303.890303] ? set_anon_super+0xc0/0xc0 [ 1303.890720] ? rpc_kill_sb+0x1b0/0x1b0 [ 1303.891210] get_tree_keyed+0x55/0x210 [ 1303.891615] vfs_get_tree+0x8e/0x300 [ 1303.892053] path_mount+0x1429/0x2120 [ 1303.892460] ? strncpy_from_user+0x9e/0x470 [ 1303.892957] ? finish_automount+0xa90/0xa90 [ 1303.893404] ? getname_flags.part.0+0x1dd/0x4f0 [ 1303.893949] __x64_sys_mount+0x282/0x300 [ 1303.894366] ? copy_mnt_ns+0xa00/0xa00 [ 1303.894826] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1303.895380] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1303.896006] do_syscall_64+0x33/0x40 [ 1303.896384] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1303.896899] RIP: 0033:0x7fe8bba05b19 [ 1303.897240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.898984] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1303.899681] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1303.900415] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1303.900859] FAULT_INJECTION: forcing a failure. [ 1303.900859] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.901107] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1303.901126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1303.903365] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1303.904129] CPU: 1 PID: 7865 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1303.904715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1303.905408] Call Trace: [ 1303.905645] dump_stack+0x107/0x167 [ 1303.905972] should_fail.cold+0x5/0xa [ 1303.906302] ? create_object.isra.0+0x3a/0xa20 [ 1303.906708] should_failslab+0x5/0x20 [ 1303.907038] kmem_cache_alloc+0x5b/0x310 [ 1303.907389] create_object.isra.0+0x3a/0xa20 [ 1303.907768] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1303.908200] __kmalloc_track_caller+0x177/0x370 [ 1303.908602] ? trace_probe_init+0x284/0x4e0 [ 1303.908983] kstrdup+0x36/0x70 [ 1303.909261] trace_probe_init+0x284/0x4e0 [ 1303.909620] alloc_trace_uprobe+0x63/0x2b0 [ 1303.909997] create_local_trace_uprobe+0x101/0x4e0 [ 1303.910414] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1303.910807] ? memdup_user+0x7c/0xd0 [ 1303.911134] perf_uprobe_init+0x136/0x210 [ 1303.911496] perf_uprobe_event_init+0xff/0x1d0 [ 1303.911882] perf_try_init_event+0x130/0x570 [ 1303.912257] perf_event_alloc.part.0+0xd96/0x2b70 [ 1303.912676] __do_sys_perf_event_open+0x579/0x2e60 [ 1303.913103] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1303.913514] ? perf_event_set_output+0x5b0/0x5b0 [ 1303.913936] ? wait_for_completion_io+0x270/0x270 [ 1303.914362] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1303.914801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1303.915234] do_syscall_64+0x33/0x40 [ 1303.915550] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1303.915984] RIP: 0033:0x7f229d85eb19 [ 1303.916299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1303.917842] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1303.918486] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1303.919088] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1303.919686] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1303.920288] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1303.920895] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:12:46 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 17) 02:12:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227a, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:12:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(0x0, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:12:46 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 22) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:12:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:12:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1304.023769] FAULT_INJECTION: forcing a failure. [ 1304.023769] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.025022] CPU: 0 PID: 7870 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1304.025904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1304.026635] Call Trace: [ 1304.026937] dump_stack+0x107/0x167 [ 1304.027270] should_fail.cold+0x5/0xa [ 1304.027629] should_failslab+0x5/0x20 [ 1304.028035] __kmalloc_track_caller+0x79/0x370 [ 1304.028452] ? trace_probe_init+0x284/0x4e0 [ 1304.028937] kstrdup+0x36/0x70 [ 1304.029235] trace_probe_init+0x284/0x4e0 [ 1304.029620] alloc_trace_uprobe+0x63/0x2b0 [ 1304.030072] create_local_trace_uprobe+0x101/0x4e0 [ 1304.030521] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1304.030994] ? memdup_user+0x7c/0xd0 [ 1304.031344] perf_uprobe_init+0x136/0x210 [ 1304.031734] perf_uprobe_event_init+0xff/0x1d0 [ 1304.032192] perf_try_init_event+0x130/0x570 [ 1304.032594] perf_event_alloc.part.0+0xd96/0x2b70 [ 1304.033125] __do_sys_perf_event_open+0x579/0x2e60 [ 1304.033586] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1304.034104] ? perf_event_set_output+0x5b0/0x5b0 [ 1304.034540] ? wait_for_completion_io+0x270/0x270 [ 1304.035053] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1304.035526] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1304.036047] do_syscall_64+0x33/0x40 [ 1304.036390] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1304.036932] RIP: 0033:0x7f08909a9b19 [ 1304.037272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.041574] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1304.042346] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1304.043198] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1304.043894] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1304.044524] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1304.045214] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1304.046254] trace_uprobe: Failed to allocate trace_uprobe.(-12) 02:12:46 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1304.098163] FAULT_INJECTION: forcing a failure. [ 1304.098163] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.099896] CPU: 0 PID: 7877 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1304.100533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1304.101418] Call Trace: [ 1304.101666] dump_stack+0x107/0x167 [ 1304.102097] should_fail.cold+0x5/0xa [ 1304.102448] ? create_object.isra.0+0x3a/0xa20 [ 1304.102924] should_failslab+0x5/0x20 [ 1304.103276] kmem_cache_alloc+0x5b/0x310 [ 1304.103651] create_object.isra.0+0x3a/0xa20 [ 1304.104473] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1304.104983] __kmalloc+0x16e/0x390 [ 1304.105318] __list_lru_init+0xcd/0x890 [ 1304.105700] alloc_super+0x8b8/0xa90 [ 1304.106129] ? fput+0x20/0x20 [ 1304.106416] sget_fc+0x110/0x860 [ 1304.106726] ? set_anon_super+0xc0/0xc0 [ 1304.107142] ? rpc_kill_sb+0x1b0/0x1b0 [ 1304.107499] get_tree_keyed+0x55/0x210 [ 1304.107906] vfs_get_tree+0x8e/0x300 [ 1304.108243] path_mount+0x1429/0x2120 [ 1304.108601] ? strncpy_from_user+0x9e/0x470 [ 1304.109054] ? finish_automount+0xa90/0xa90 [ 1304.109451] ? getname_flags.part.0+0x1dd/0x4f0 [ 1304.109981] __x64_sys_mount+0x282/0x300 [ 1304.110347] ? copy_mnt_ns+0xa00/0xa00 [ 1304.110711] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1304.111232] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1304.111698] do_syscall_64+0x33/0x40 [ 1304.112097] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1304.112560] RIP: 0033:0x7fe8bba05b19 [ 1304.112951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.114668] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1304.115401] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1304.116091] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1304.116725] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1304.117405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1304.118131] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:12:46 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 19) 02:12:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(0x0, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1304.195584] FAULT_INJECTION: forcing a failure. [ 1304.195584] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.196608] CPU: 1 PID: 7887 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1304.197185] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1304.197950] Call Trace: [ 1304.198186] dump_stack+0x107/0x167 [ 1304.198498] should_fail.cold+0x5/0xa [ 1304.198834] should_failslab+0x5/0x20 [ 1304.199170] __kmalloc_track_caller+0x79/0x370 [ 1304.199557] ? create_local_trace_uprobe+0x1af/0x4e0 [ 1304.200001] kstrdup+0x36/0x70 [ 1304.200284] create_local_trace_uprobe+0x1af/0x4e0 [ 1304.200702] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1304.201097] ? memdup_user+0x7c/0xd0 [ 1304.201433] perf_uprobe_init+0x136/0x210 [ 1304.201829] perf_uprobe_event_init+0xff/0x1d0 [ 1304.202217] perf_try_init_event+0x130/0x570 [ 1304.202593] perf_event_alloc.part.0+0xd96/0x2b70 [ 1304.203011] __do_sys_perf_event_open+0x579/0x2e60 [ 1304.203441] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1304.203850] ? perf_event_set_output+0x5b0/0x5b0 [ 1304.204257] ? wait_for_completion_io+0x270/0x270 [ 1304.204689] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1304.205133] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1304.205573] do_syscall_64+0x33/0x40 [ 1304.205906] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1304.206338] RIP: 0033:0x7f229d85eb19 [ 1304.206656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.208199] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1304.208842] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 02:12:46 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 18) [ 1304.209441] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1304.210054] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1304.210662] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1304.211264] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:12:46 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1304.293734] FAULT_INJECTION: forcing a failure. [ 1304.293734] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.294797] CPU: 1 PID: 7891 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1304.295378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1304.296069] Call Trace: [ 1304.296303] dump_stack+0x107/0x167 [ 1304.296616] should_fail.cold+0x5/0xa [ 1304.296953] should_failslab+0x5/0x20 [ 1304.297283] __kmalloc_track_caller+0x79/0x370 [ 1304.297688] ? trace_probe_init+0x284/0x4e0 [ 1304.298076] kstrdup+0x36/0x70 [ 1304.298359] trace_probe_init+0x284/0x4e0 [ 1304.298717] alloc_trace_uprobe+0x63/0x2b0 [ 1304.299077] create_local_trace_uprobe+0x101/0x4e0 [ 1304.299496] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1304.299890] ? memdup_user+0x7c/0xd0 [ 1304.300216] perf_uprobe_init+0x136/0x210 [ 1304.300581] perf_uprobe_event_init+0xff/0x1d0 [ 1304.300969] perf_try_init_event+0x130/0x570 [ 1304.301349] perf_event_alloc.part.0+0xd96/0x2b70 [ 1304.301788] __do_sys_perf_event_open+0x579/0x2e60 [ 1304.302217] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1304.302635] ? perf_event_set_output+0x5b0/0x5b0 [ 1304.303037] ? wait_for_completion_io+0x270/0x270 [ 1304.303469] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1304.303922] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1304.304361] do_syscall_64+0x33/0x40 [ 1304.304680] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1304.305114] RIP: 0033:0x7f08909a9b19 [ 1304.305440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.306991] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1304.307636] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1304.308235] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1304.308839] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1304.309440] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1304.310055] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1304.310783] trace_uprobe: Failed to allocate trace_uprobe.(-12) 02:13:06 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:06 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 19) 02:13:06 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:06 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) (fail_nth: 1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:13:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:13:06 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 23) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:13:06 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 20) [ 1323.960997] FAULT_INJECTION: forcing a failure. [ 1323.960997] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1323.961994] FAULT_INJECTION: forcing a failure. [ 1323.961994] name failslab, interval 1, probability 0, space 0, times 0 [ 1323.962011] CPU: 1 PID: 7912 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1323.962018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1323.962022] Call Trace: [ 1323.962042] dump_stack+0x107/0x167 [ 1323.962055] should_fail.cold+0x5/0xa [ 1323.962080] should_failslab+0x5/0x20 [ 1323.962107] __kmalloc_track_caller+0x79/0x370 [ 1323.965850] ? create_local_trace_uprobe+0x1af/0x4e0 [ 1323.966304] kstrdup+0x36/0x70 [ 1323.966582] create_local_trace_uprobe+0x1af/0x4e0 [ 1323.967012] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1323.967405] ? memdup_user+0x7c/0xd0 [ 1323.967733] perf_uprobe_init+0x136/0x210 [ 1323.968114] perf_uprobe_event_init+0xff/0x1d0 [ 1323.968502] perf_try_init_event+0x130/0x570 [ 1323.968880] perf_event_alloc.part.0+0xd96/0x2b70 [ 1323.969311] __do_sys_perf_event_open+0x579/0x2e60 [ 1323.969742] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1323.970179] ? perf_event_set_output+0x5b0/0x5b0 [ 1323.970583] ? wait_for_completion_io+0x270/0x270 [ 1323.971012] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1323.971473] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1323.971910] do_syscall_64+0x33/0x40 [ 1323.972242] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1323.972676] RIP: 0033:0x7f08909a9b19 [ 1323.972993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1323.974569] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1323.975210] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1323.975821] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1323.976432] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1323.977028] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1323.977644] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1323.978286] CPU: 0 PID: 7910 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 1323.978871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1323.979560] Call Trace: [ 1323.979791] dump_stack+0x107/0x167 [ 1323.980100] should_fail.cold+0x5/0xa [ 1323.980428] _copy_from_user+0x2e/0x1b0 [ 1323.980767] __blk_trace_setup+0x96/0x180 [ 1323.981115] ? do_blk_trace_setup+0xc10/0xc10 [ 1323.981503] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1323.981964] blk_trace_setup+0x43/0x60 [ 1323.982295] sg_ioctl_common+0x634/0x2570 [ 1323.982648] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1323.983083] ? do_vfs_ioctl+0x283/0x10d0 [ 1323.983425] ? sg_write+0x120/0x120 [ 1323.983732] ? generic_block_fiemap+0x60/0x60 [ 1323.984107] ? lock_downgrade+0x6d0/0x6d0 [ 1323.984460] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1323.984866] ? wait_for_completion_io+0x270/0x270 [ 1323.985277] ? selinux_file_ioctl+0xb6/0x270 [ 1323.985648] ? sg_compat_ioctl+0x120/0x120 [ 1323.986028] sg_ioctl+0x8f/0x120 [ 1323.986315] __x64_sys_ioctl+0x19a/0x210 [ 1323.986663] do_syscall_64+0x33/0x40 [ 1323.986977] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1323.987403] RIP: 0033:0x7f23f054db19 [ 1323.987717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1323.989230] RSP: 002b:00007f23edac3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1323.989881] RAX: ffffffffffffffda RBX: 00007f23f0660f60 RCX: 00007f23f054db19 [ 1323.990478] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1323.991072] RBP: 00007f23edac31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1323.991664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1323.992258] R13: 00007ffedbbf759f R14: 00007f23edac3300 R15: 0000000000022000 [ 1323.996307] FAULT_INJECTION: forcing a failure. [ 1323.996307] name failslab, interval 1, probability 0, space 0, times 0 [ 1323.997303] CPU: 0 PID: 7907 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1323.997888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1323.998587] Call Trace: [ 1323.998814] dump_stack+0x107/0x167 [ 1323.999126] should_fail.cold+0x5/0xa [ 1323.999464] ? kvmalloc_node+0x119/0x170 [ 1323.999819] should_failslab+0x5/0x20 [ 1324.000148] __kmalloc_node+0x76/0x420 [ 1324.000482] ? lockdep_init_map_type+0x2c7/0x780 [ 1324.000891] kvmalloc_node+0x119/0x170 [ 1324.001226] __list_lru_init+0x511/0x890 [ 1324.001579] alloc_super+0x8b8/0xa90 [ 1324.001911] ? fput+0x20/0x20 [ 1324.002184] sget_fc+0x110/0x860 [ 1324.002475] ? set_anon_super+0xc0/0xc0 [ 1324.002816] ? rpc_kill_sb+0x1b0/0x1b0 [ 1324.003149] get_tree_keyed+0x55/0x210 [ 1324.003484] vfs_get_tree+0x8e/0x300 [ 1324.003802] path_mount+0x1429/0x2120 [ 1324.004133] ? strncpy_from_user+0x9e/0x470 [ 1324.004502] ? finish_automount+0xa90/0xa90 [ 1324.004869] ? getname_flags.part.0+0x1dd/0x4f0 [ 1324.005270] __x64_sys_mount+0x282/0x300 [ 1324.005621] ? copy_mnt_ns+0xa00/0xa00 [ 1324.005972] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1324.006417] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1324.006858] do_syscall_64+0x33/0x40 [ 1324.007177] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1324.007612] RIP: 0033:0x7fe8bba05b19 [ 1324.007930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1324.009488] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1324.010156] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1324.010753] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1324.011346] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1324.011939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1324.012539] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1324.016958] FAULT_INJECTION: forcing a failure. [ 1324.016958] name failslab, interval 1, probability 0, space 0, times 0 [ 1324.017974] CPU: 0 PID: 7911 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1324.018562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1324.019279] Call Trace: [ 1324.019522] dump_stack+0x107/0x167 [ 1324.019853] should_fail.cold+0x5/0xa [ 1324.020214] ? create_object.isra.0+0x3a/0xa20 [ 1324.020641] should_failslab+0x5/0x20 [ 1324.020990] kmem_cache_alloc+0x5b/0x310 [ 1324.021345] create_object.isra.0+0x3a/0xa20 [ 1324.021731] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1324.021749] __kmalloc_track_caller+0x177/0x370 [ 1324.021761] ? create_local_trace_uprobe+0x1af/0x4e0 [ 1324.021778] kstrdup+0x36/0x70 [ 1324.021789] create_local_trace_uprobe+0x1af/0x4e0 [ 1324.021801] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1324.021817] ? memdup_user+0x7c/0xd0 [ 1324.021842] perf_uprobe_init+0x136/0x210 [ 1324.021863] perf_uprobe_event_init+0xff/0x1d0 02:13:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1324.021874] perf_try_init_event+0x130/0x570 [ 1324.021888] perf_event_alloc.part.0+0xd96/0x2b70 [ 1324.021910] __do_sys_perf_event_open+0x579/0x2e60 [ 1324.021929] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1324.021942] ? perf_event_set_output+0x5b0/0x5b0 [ 1324.021953] ? wait_for_completion_io+0x270/0x270 02:13:06 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1324.021980] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1324.021991] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1324.022003] do_syscall_64+0x33/0x40 [ 1324.022014] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1324.022021] RIP: 0033:0x7f229d85eb19 [ 1324.022032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1324.022038] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1324.022050] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1324.022056] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1324.022062] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1324.022069] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1324.022076] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:13:19 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 24) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:13:19 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 21) 02:13:19 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d300000", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:19 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 20) 02:13:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) (fail_nth: 2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:13:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1337.243950] FAULT_INJECTION: forcing a failure. [ 1337.243950] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.246152] CPU: 0 PID: 7938 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1337.247382] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.248878] Call Trace: [ 1337.249366] dump_stack+0x107/0x167 [ 1337.250109] should_fail.cold+0x5/0xa [ 1337.250827] ? __list_lru_init+0xcd/0x890 [ 1337.251629] should_failslab+0x5/0x20 [ 1337.252353] __kmalloc+0x72/0x390 [ 1337.253019] __list_lru_init+0xcd/0x890 [ 1337.253804] alloc_super+0x8b8/0xa90 [ 1337.254683] ? fput+0x20/0x20 [ 1337.255277] sget_fc+0x110/0x860 [ 1337.255933] ? set_anon_super+0xc0/0xc0 [ 1337.256724] ? rpc_kill_sb+0x1b0/0x1b0 [ 1337.257463] get_tree_keyed+0x55/0x210 [ 1337.258280] vfs_get_tree+0x8e/0x300 [ 1337.259008] path_mount+0x1429/0x2120 [ 1337.259092] FAULT_INJECTION: forcing a failure. [ 1337.259092] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.259682] ? strncpy_from_user+0x9e/0x470 [ 1337.259696] ? finish_automount+0xa90/0xa90 [ 1337.259712] ? getname_flags.part.0+0x1dd/0x4f0 [ 1337.263213] __x64_sys_mount+0x282/0x300 [ 1337.263893] ? copy_mnt_ns+0xa00/0xa00 [ 1337.264555] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.265438] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.266420] do_syscall_64+0x33/0x40 [ 1337.267056] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.267935] RIP: 0033:0x7fe8bba05b19 [ 1337.268572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.272143] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1337.273421] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1337.274790] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1337.276007] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1337.277223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1337.278597] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1337.279826] CPU: 1 PID: 7936 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 1337.280564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.281450] Call Trace: [ 1337.281743] dump_stack+0x107/0x167 [ 1337.282140] should_fail.cold+0x5/0xa [ 1337.282561] ? do_blk_trace_setup+0x1e3/0xc10 [ 1337.283048] should_failslab+0x5/0x20 [ 1337.283462] kmem_cache_alloc_trace+0x55/0x320 [ 1337.283962] do_blk_trace_setup+0x1e3/0xc10 [ 1337.284435] ? _copy_from_user+0xfb/0x1b0 [ 1337.284894] __blk_trace_setup+0xca/0x180 [ 1337.285344] ? do_blk_trace_setup+0xc10/0xc10 [ 1337.285847] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1337.286353] blk_trace_setup+0x43/0x60 [ 1337.286721] sg_ioctl_common+0x634/0x2570 [ 1337.287108] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1337.287583] ? do_vfs_ioctl+0x283/0x10d0 [ 1337.287957] ? sg_write+0x120/0x120 [ 1337.288294] ? generic_block_fiemap+0x60/0x60 [ 1337.288705] ? lock_downgrade+0x6d0/0x6d0 [ 1337.289087] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1337.289533] ? wait_for_completion_io+0x270/0x270 [ 1337.289991] ? selinux_file_ioctl+0xb6/0x270 [ 1337.290451] ? sg_compat_ioctl+0x120/0x120 [ 1337.290909] sg_ioctl+0x8f/0x120 [ 1337.291282] __x64_sys_ioctl+0x19a/0x210 [ 1337.291732] do_syscall_64+0x33/0x40 [ 1337.292138] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.292689] RIP: 0033:0x7f23f054db19 [ 1337.293093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.295004] RSP: 002b:00007f23edac3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1337.295825] RAX: ffffffffffffffda RBX: 00007f23f0660f60 RCX: 00007f23f054db19 [ 1337.296593] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1337.297355] RBP: 00007f23edac31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1337.298116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1337.298886] R13: 00007ffedbbf759f R14: 00007f23edac3300 R15: 0000000000022000 02:13:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227c, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1337.307871] FAULT_INJECTION: forcing a failure. [ 1337.307871] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.309196] CPU: 1 PID: 7943 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1337.309932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.311825] Call Trace: [ 1337.312268] dump_stack+0x107/0x167 [ 1337.312891] should_fail.cold+0x5/0xa [ 1337.313544] ? create_object.isra.0+0x3a/0xa20 [ 1337.314427] should_failslab+0x5/0x20 [ 1337.315055] kmem_cache_alloc+0x5b/0x310 [ 1337.315741] create_object.isra.0+0x3a/0xa20 [ 1337.316480] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1337.317327] __kmalloc_track_caller+0x177/0x370 [ 1337.318040] ? create_local_trace_uprobe+0x1af/0x4e0 [ 1337.318484] kstrdup+0x36/0x70 [ 1337.318756] create_local_trace_uprobe+0x1af/0x4e0 [ 1337.319166] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1337.319560] ? memdup_user+0x7c/0xd0 [ 1337.319887] perf_uprobe_init+0x136/0x210 [ 1337.320246] perf_uprobe_event_init+0xff/0x1d0 [ 1337.320632] perf_try_init_event+0x130/0x570 [ 1337.321003] perf_event_alloc.part.0+0xd96/0x2b70 [ 1337.321421] __do_sys_perf_event_open+0x579/0x2e60 [ 1337.321838] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1337.322257] ? perf_event_set_output+0x5b0/0x5b0 [ 1337.322659] ? wait_for_completion_io+0x270/0x270 [ 1337.323079] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.323522] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.323952] do_syscall_64+0x33/0x40 [ 1337.324264] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.324694] RIP: 0033:0x7f229d85eb19 [ 1337.325006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.326546] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1337.327178] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1337.327771] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1337.328365] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1337.328957] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1337.329551] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1337.339046] FAULT_INJECTION: forcing a failure. [ 1337.339046] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.340110] CPU: 1 PID: 7937 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1337.341498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.343519] Call Trace: [ 1337.344155] dump_stack+0x107/0x167 [ 1337.345043] should_fail.cold+0x5/0xa [ 1337.345934] ? create_object.isra.0+0x3a/0xa20 [ 1337.347045] should_failslab+0x5/0x20 [ 1337.347963] kmem_cache_alloc+0x5b/0x310 [ 1337.348961] create_object.isra.0+0x3a/0xa20 [ 1337.350057] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1337.351292] __kmalloc_track_caller+0x177/0x370 [ 1337.352414] ? create_local_trace_uprobe+0x1af/0x4e0 [ 1337.353650] kstrdup+0x36/0x70 [ 1337.354421] create_local_trace_uprobe+0x1af/0x4e0 [ 1337.355551] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1337.356507] ? memdup_user+0x7c/0xd0 [ 1337.357288] perf_uprobe_init+0x136/0x210 [ 1337.358182] perf_uprobe_event_init+0xff/0x1d0 [ 1337.359243] perf_try_init_event+0x130/0x570 [ 1337.360249] perf_event_alloc.part.0+0xd96/0x2b70 [ 1337.361355] __do_sys_perf_event_open+0x579/0x2e60 [ 1337.361937] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1337.362482] ? perf_event_set_output+0x5b0/0x5b0 [ 1337.363020] ? wait_for_completion_io+0x270/0x270 [ 1337.363583] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.364180] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.364789] do_syscall_64+0x33/0x40 [ 1337.365209] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.365794] RIP: 0033:0x7f08909a9b19 [ 1337.366222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.368288] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1337.369151] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1337.369919] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1337.370742] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1337.371542] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1337.372314] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:13:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:19 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 25) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:13:19 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d300000", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) (fail_nth: 3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1337.460113] FAULT_INJECTION: forcing a failure. [ 1337.460113] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.461366] CPU: 1 PID: 7957 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 1337.462072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.462921] Call Trace: [ 1337.463205] dump_stack+0x107/0x167 [ 1337.463594] should_fail.cold+0x5/0xa [ 1337.463994] ? create_object.isra.0+0x3a/0xa20 [ 1337.464462] should_failslab+0x5/0x20 [ 1337.464853] kmem_cache_alloc+0x5b/0x310 [ 1337.470327] create_object.isra.0+0x3a/0xa20 [ 1337.470787] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1337.471313] kmem_cache_alloc_trace+0x151/0x320 [ 1337.471807] do_blk_trace_setup+0x1e3/0xc10 [ 1337.472268] ? _copy_from_user+0xfb/0x1b0 [ 1337.472706] __blk_trace_setup+0xca/0x180 [ 1337.473133] ? do_blk_trace_setup+0xc10/0xc10 [ 1337.473604] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1337.474153] blk_trace_setup+0x43/0x60 [ 1337.474559] sg_ioctl_common+0x634/0x2570 [ 1337.475001] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1337.475543] ? do_vfs_ioctl+0x283/0x10d0 [ 1337.475982] ? sg_write+0x120/0x120 [ 1337.476349] ? generic_block_fiemap+0x60/0x60 [ 1337.476806] ? lock_downgrade+0x6d0/0x6d0 [ 1337.477233] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1337.477757] ? wait_for_completion_io+0x270/0x270 [ 1337.478277] ? selinux_file_ioctl+0xb6/0x270 [ 1337.478742] ? sg_compat_ioctl+0x120/0x120 [ 1337.479177] sg_ioctl+0x8f/0x120 [ 1337.479536] __x64_sys_ioctl+0x19a/0x210 [ 1337.479960] do_syscall_64+0x33/0x40 [ 1337.480319] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.480794] FAULT_INJECTION: forcing a failure. [ 1337.480794] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.480815] RIP: 0033:0x7f23f054db19 [ 1337.482700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.484405] RSP: 002b:00007f23edac3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1337.485120] RAX: ffffffffffffffda RBX: 00007f23f0660f60 RCX: 00007f23f054db19 [ 1337.494050] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1337.502391] RBP: 00007f23edac31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1337.503054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1337.503682] R13: 00007ffedbbf759f R14: 00007f23edac3300 R15: 0000000000022000 [ 1337.504356] CPU: 0 PID: 7958 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1337.505011] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.510333] Call Trace: [ 1337.510570] dump_stack+0x107/0x167 [ 1337.510892] should_fail.cold+0x5/0xa [ 1337.511228] ? create_object.isra.0+0x3a/0xa20 [ 1337.518288] should_failslab+0x5/0x20 [ 1337.518637] kmem_cache_alloc+0x5b/0x310 [ 1337.519020] create_object.isra.0+0x3a/0xa20 [ 1337.519423] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1337.519895] __kmalloc_node+0x1ae/0x420 [ 1337.520261] ? lockdep_init_map_type+0x2c7/0x780 [ 1337.520704] kvmalloc_node+0x119/0x170 [ 1337.521064] __list_lru_init+0x511/0x890 [ 1337.526128] alloc_super+0x8b8/0xa90 [ 1337.526468] ? fput+0x20/0x20 [ 1337.529990] sget_fc+0x110/0x860 [ 1337.534122] ? set_anon_super+0xc0/0xc0 [ 1337.534455] ? rpc_kill_sb+0x1b0/0x1b0 [ 1337.534776] get_tree_keyed+0x55/0x210 [ 1337.535098] vfs_get_tree+0x8e/0x300 [ 1337.535409] path_mount+0x1429/0x2120 [ 1337.535730] ? strncpy_from_user+0x9e/0x470 [ 1337.536085] ? finish_automount+0xa90/0xa90 [ 1337.536462] ? getname_flags.part.0+0x1dd/0x4f0 [ 1337.536873] __x64_sys_mount+0x282/0x300 [ 1337.537222] ? copy_mnt_ns+0xa00/0xa00 [ 1337.537567] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.542152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.542616] do_syscall_64+0x33/0x40 [ 1337.542956] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.543417] RIP: 0033:0x7fe8bba05b19 [ 1337.543762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.545403] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1337.546092] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1337.546770] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1337.547422] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1337.548088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1337.548678] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:13:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:13:19 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d300000", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227d, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:19 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 26) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:13:19 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 22) 02:13:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) (fail_nth: 4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1337.677282] blktrace: Concurrent blktraces are not allowed on sg0 [ 1337.707513] FAULT_INJECTION: forcing a failure. [ 1337.707513] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.708812] CPU: 0 PID: 7974 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1337.709512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.710361] Call Trace: [ 1337.710645] dump_stack+0x107/0x167 [ 1337.711028] should_fail.cold+0x5/0xa [ 1337.711418] ? create_object.isra.0+0x3a/0xa20 [ 1337.711905] should_failslab+0x5/0x20 [ 1337.712266] FAULT_INJECTION: forcing a failure. [ 1337.712266] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.712296] kmem_cache_alloc+0x5b/0x310 [ 1337.713729] create_object.isra.0+0x3a/0xa20 [ 1337.714173] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1337.714667] __kmalloc_node+0x1ae/0x420 [ 1337.715071] kvmalloc_node+0x119/0x170 [ 1337.715454] __list_lru_init+0x511/0x890 [ 1337.715855] alloc_super+0x8b8/0xa90 [ 1337.716216] ? fput+0x20/0x20 [ 1337.716518] sget_fc+0x110/0x860 [ 1337.716818] ? set_anon_super+0xc0/0xc0 [ 1337.717159] ? rpc_kill_sb+0x1b0/0x1b0 [ 1337.717496] get_tree_keyed+0x55/0x210 [ 1337.717830] vfs_get_tree+0x8e/0x300 [ 1337.718156] path_mount+0x1429/0x2120 [ 1337.718496] ? strncpy_from_user+0x9e/0x470 [ 1337.718870] ? finish_automount+0xa90/0xa90 [ 1337.719276] ? getname_flags.part.0+0x1dd/0x4f0 [ 1337.719737] __x64_sys_mount+0x282/0x300 [ 1337.720128] ? copy_mnt_ns+0xa00/0xa00 [ 1337.720517] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.721029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.721527] do_syscall_64+0x33/0x40 [ 1337.721893] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.722388] RIP: 0033:0x7fe8bba05b19 [ 1337.722764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.724422] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1337.725100] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1337.725781] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1337.726465] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1337.727156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1337.738182] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1337.738878] CPU: 1 PID: 7969 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1337.739603] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.740495] Call Trace: [ 1337.740777] dump_stack+0x107/0x167 [ 1337.741181] should_fail.cold+0x5/0xa [ 1337.741600] ? create_object.isra.0+0x3a/0xa20 [ 1337.750092] should_failslab+0x5/0x20 [ 1337.750451] kmem_cache_alloc+0x5b/0x310 [ 1337.750839] create_object.isra.0+0x3a/0xa20 [ 1337.751711] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1337.752197] __kmalloc+0x16e/0x390 [ 1337.752537] ? __kmalloc_track_caller+0x2c6/0x370 [ 1337.753001] traceprobe_set_print_fmt+0x5a/0xd0 [ 1337.753432] create_local_trace_uprobe+0x309/0x4e0 [ 1337.753896] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1337.754339] ? memdup_user+0x7c/0xd0 [ 1337.754984] perf_uprobe_init+0x136/0x210 [ 1337.755377] perf_uprobe_event_init+0xff/0x1d0 [ 1337.755808] perf_try_init_event+0x130/0x570 [ 1337.756226] perf_event_alloc.part.0+0xd96/0x2b70 [ 1337.756716] __do_sys_perf_event_open+0x579/0x2e60 [ 1337.757192] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1337.757662] ? perf_event_set_output+0x5b0/0x5b0 [ 1337.758114] ? wait_for_completion_io+0x270/0x270 [ 1337.758618] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.759120] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.759615] do_syscall_64+0x33/0x40 [ 1337.759982] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1337.760462] RIP: 0033:0x7f229d85eb19 [ 1337.760812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.762495] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1337.763187] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1337.763851] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1337.764504] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1337.769998] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1337.771604] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:13:33 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 21) 02:13:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:13:33 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 23) 02:13:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:33 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:13:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227e, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:33 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d3000000800", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:33 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 27) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1350.946961] FAULT_INJECTION: forcing a failure. [ 1350.946961] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.948060] CPU: 1 PID: 8000 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1350.948913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.949639] Call Trace: [ 1350.949872] dump_stack+0x107/0x167 [ 1350.950265] should_fail.cold+0x5/0xa [ 1350.950592] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1350.951024] should_failslab+0x5/0x20 [ 1350.951402] kmem_cache_alloc_trace+0x55/0x320 [ 1350.951791] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1350.952254] __list_lru_init+0x44d/0x890 [ 1350.952601] alloc_super+0x8b8/0xa90 [ 1350.952916] ? fput+0x20/0x20 [ 1350.953227] sget_fc+0x110/0x860 [ 1350.953514] ? set_anon_super+0xc0/0xc0 [ 1350.953851] ? rpc_kill_sb+0x1b0/0x1b0 [ 1350.954272] get_tree_keyed+0x55/0x210 [ 1350.954602] vfs_get_tree+0x8e/0x300 [ 1350.954917] path_mount+0x1429/0x2120 [ 1350.955336] ? strncpy_from_user+0x9e/0x470 [ 1350.955698] ? finish_automount+0xa90/0xa90 [ 1350.956063] ? getname_flags.part.0+0x1dd/0x4f0 [ 1350.957057] __x64_sys_mount+0x282/0x300 [ 1350.957444] ? copy_mnt_ns+0xa00/0xa00 [ 1350.957786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.958297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.958733] do_syscall_64+0x33/0x40 [ 1350.959048] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1350.959549] RIP: 0033:0x7fe8bba05b19 [ 1350.959863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.961477] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1350.961867] blktrace: Concurrent blktraces are not allowed on sg0 [ 1350.962174] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1350.962182] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1350.962197] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1350.964625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1350.965265] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1350.967043] FAULT_INJECTION: forcing a failure. [ 1350.967043] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.968280] CPU: 0 PID: 7994 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1350.968875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.969580] Call Trace: [ 1350.969817] dump_stack+0x107/0x167 [ 1350.970150] should_fail.cold+0x5/0xa [ 1350.970500] ? create_object.isra.0+0x3a/0xa20 [ 1350.970908] should_failslab+0x5/0x20 [ 1350.971240] kmem_cache_alloc+0x5b/0x310 [ 1350.971591] create_object.isra.0+0x3a/0xa20 [ 1350.971978] kmemleak_alloc_percpu+0xa0/0x100 [ 1350.972367] pcpu_alloc+0x4e2/0x1240 [ 1350.972704] perf_trace_event_init+0x376/0x9c0 [ 1350.973100] ? memdup_user+0x7c/0xd0 [ 1350.973435] perf_uprobe_init+0x173/0x210 [ 1350.973800] perf_uprobe_event_init+0xff/0x1d0 [ 1350.974213] perf_try_init_event+0x130/0x570 [ 1350.974590] perf_event_alloc.part.0+0xd96/0x2b70 [ 1350.975005] __do_sys_perf_event_open+0x579/0x2e60 [ 1350.975429] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1350.975836] ? perf_event_set_output+0x5b0/0x5b0 [ 1350.976236] ? wait_for_completion_io+0x270/0x270 [ 1350.976661] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.977101] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.977536] do_syscall_64+0x33/0x40 [ 1350.977850] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1350.978302] RIP: 0033:0x7f229d85eb19 [ 1350.978619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.980159] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1350.980798] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1350.981395] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1350.981991] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1350.982602] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1350.983199] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1351.001059] FAULT_INJECTION: forcing a failure. [ 1351.001059] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.002168] CPU: 1 PID: 7996 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1351.002776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1351.002781] Call Trace: [ 1351.002811] dump_stack+0x107/0x167 [ 1351.002843] should_fail.cold+0x5/0xa [ 1351.002888] ? traceprobe_set_print_fmt+0x5a/0xd0 [ 1351.004847] should_failslab+0x5/0x20 [ 1351.005221] __kmalloc+0x72/0x390 [ 1351.005518] ? __kmalloc_track_caller+0x2c6/0x370 [ 1351.005929] traceprobe_set_print_fmt+0x5a/0xd0 [ 1351.006386] create_local_trace_uprobe+0x309/0x4e0 [ 1351.006800] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1351.007271] ? memdup_user+0x7c/0xd0 [ 1351.007601] perf_uprobe_init+0x136/0x210 [ 1351.007966] perf_uprobe_event_init+0xff/0x1d0 [ 1351.008398] perf_try_init_event+0x130/0x570 [ 1351.008774] perf_event_alloc.part.0+0xd96/0x2b70 [ 1351.009234] __do_sys_perf_event_open+0x579/0x2e60 [ 1351.009660] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1351.010078] ? perf_event_set_output+0x5b0/0x5b0 [ 1351.010524] ? wait_for_completion_io+0x270/0x270 [ 1351.010953] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1351.011465] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1351.011906] do_syscall_64+0x33/0x40 [ 1351.012335] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1351.012765] RIP: 0033:0x7f08909a9b19 [ 1351.013081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1351.015311] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1351.015949] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1351.016587] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1351.017250] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1351.017851] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1351.018512] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:13:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227f, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:13:33 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d3000000800", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:33 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:13:33 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1267, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:13:33 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 28) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1351.153436] FAULT_INJECTION: forcing a failure. [ 1351.153436] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.154632] CPU: 1 PID: 8019 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1351.155242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1351.155934] Call Trace: [ 1351.156218] dump_stack+0x107/0x167 [ 1351.156531] should_fail.cold+0x5/0xa [ 1351.156855] ? create_object.isra.0+0x3a/0xa20 [ 1351.157292] should_failslab+0x5/0x20 [ 1351.157624] kmem_cache_alloc+0x5b/0x310 [ 1351.157968] create_object.isra.0+0x3a/0xa20 [ 1351.158402] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1351.158838] kmem_cache_alloc_trace+0x151/0x320 [ 1351.159314] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1351.159734] __list_lru_init+0x44d/0x890 [ 1351.160085] alloc_super+0x8b8/0xa90 [ 1351.160449] ? fput+0x20/0x20 [ 1351.160715] sget_fc+0x110/0x860 [ 1351.161002] ? set_anon_super+0xc0/0xc0 [ 1351.161386] ? rpc_kill_sb+0x1b0/0x1b0 [ 1351.161715] get_tree_keyed+0x55/0x210 [ 1351.162052] vfs_get_tree+0x8e/0x300 [ 1351.162417] path_mount+0x1429/0x2120 [ 1351.162748] ? strncpy_from_user+0x9e/0x470 [ 1351.163178] ? finish_automount+0xa90/0xa90 [ 1351.163550] ? getname_flags.part.0+0x1dd/0x4f0 [ 1351.163946] __x64_sys_mount+0x282/0x300 [ 1351.164334] ? copy_mnt_ns+0xa00/0xa00 [ 1351.164672] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1351.165157] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1351.165598] do_syscall_64+0x33/0x40 [ 1351.165911] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1351.166401] RIP: 0033:0x7fe8bba05b19 [ 1351.166716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1351.168346] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1351.168984] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1351.169626] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1351.170281] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1351.170878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1351.171541] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:13:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:46 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 29) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:13:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:13:46 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 22) 02:13:46 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 24) 02:13:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2282, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:46 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d3000000800", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1274, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1363.925552] FAULT_INJECTION: forcing a failure. [ 1363.925552] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.926643] CPU: 0 PID: 8033 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1363.927248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.927980] Call Trace: [ 1363.928230] dump_stack+0x107/0x167 [ 1363.928564] should_fail.cold+0x5/0xa [ 1363.928913] ? create_object.isra.0+0x3a/0xa20 [ 1363.929323] ? create_object.isra.0+0x3a/0xa20 [ 1363.929746] should_failslab+0x5/0x20 [ 1363.930099] kmem_cache_alloc+0x5b/0x310 [ 1363.930488] ? mark_held_locks+0x9e/0xe0 [ 1363.930861] create_object.isra.0+0x3a/0xa20 [ 1363.931276] kmemleak_alloc_percpu+0xa0/0x100 [ 1363.931689] pcpu_alloc+0x4e2/0x1240 [ 1363.932050] perf_trace_event_init+0x376/0x9c0 [ 1363.932471] ? memdup_user+0x7c/0xd0 [ 1363.932817] perf_uprobe_init+0x173/0x210 [ 1363.933210] perf_uprobe_event_init+0xff/0x1d0 [ 1363.933626] perf_try_init_event+0x130/0x570 [ 1363.934027] perf_event_alloc.part.0+0xd96/0x2b70 [ 1363.934493] __do_sys_perf_event_open+0x579/0x2e60 [ 1363.934952] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1363.935400] ? perf_event_set_output+0x5b0/0x5b0 [ 1363.935828] ? wait_for_completion_io+0x270/0x270 [ 1363.936285] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1363.936762] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1363.937237] do_syscall_64+0x33/0x40 [ 1363.937587] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1363.938057] RIP: 0033:0x7f229d85eb19 [ 1363.938414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.940064] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1363.940754] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1363.941401] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1363.942049] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1363.942701] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1363.943346] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1363.948279] FAULT_INJECTION: forcing a failure. [ 1363.948279] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.949361] CPU: 1 PID: 8040 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1363.949970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.950729] Call Trace: [ 1363.950976] dump_stack+0x107/0x167 [ 1363.951317] should_fail.cold+0x5/0xa [ 1363.951675] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1363.952139] should_failslab+0x5/0x20 [ 1363.952490] kmem_cache_alloc_trace+0x55/0x320 [ 1363.952918] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1363.953401] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1363.953419] __list_lru_init+0x44d/0x890 [ 1363.953440] alloc_super+0x8b8/0xa90 [ 1363.953455] ? fput+0x20/0x20 [ 1363.953467] sget_fc+0x110/0x860 [ 1363.953479] ? set_anon_super+0xc0/0xc0 [ 1363.953494] ? rpc_kill_sb+0x1b0/0x1b0 [ 1363.953507] get_tree_keyed+0x55/0x210 [ 1363.953521] vfs_get_tree+0x8e/0x300 [ 1363.953534] path_mount+0x1429/0x2120 [ 1363.953561] ? strncpy_from_user+0x9e/0x470 [ 1363.953574] ? finish_automount+0xa90/0xa90 [ 1363.953589] ? getname_flags.part.0+0x1dd/0x4f0 [ 1363.953613] __x64_sys_mount+0x282/0x300 [ 1363.953628] ? copy_mnt_ns+0xa00/0xa00 [ 1363.953645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1363.953659] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1363.953673] do_syscall_64+0x33/0x40 [ 1363.953689] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1363.960624] RIP: 0033:0x7fe8bba05b19 [ 1363.960967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.962623] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1363.962638] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1363.962646] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1363.962653] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1363.962661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1363.962668] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1363.971490] FAULT_INJECTION: forcing a failure. [ 1363.971490] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.971505] CPU: 0 PID: 8038 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1363.971512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.971517] Call Trace: [ 1363.971531] dump_stack+0x107/0x167 [ 1363.971547] should_fail.cold+0x5/0xa [ 1363.971562] ? create_object.isra.0+0x3a/0xa20 [ 1363.971578] should_failslab+0x5/0x20 02:13:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1275, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1363.971591] kmem_cache_alloc+0x5b/0x310 [ 1363.971612] create_object.isra.0+0x3a/0xa20 [ 1363.971627] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1363.971645] __kmalloc+0x16e/0x390 [ 1363.971660] ? __kmalloc_track_caller+0x2c6/0x370 02:13:46 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1363.971682] traceprobe_set_print_fmt+0x5a/0xd0 [ 1363.971698] create_local_trace_uprobe+0x309/0x4e0 [ 1363.971714] ? bpf_get_uprobe_info+0x3b0/0x3b0 [ 1363.971734] ? memdup_user+0x7c/0xd0 02:13:46 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 30) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1363.971754] perf_uprobe_init+0x136/0x210 [ 1363.971775] perf_uprobe_event_init+0xff/0x1d0 [ 1363.971789] perf_try_init_event+0x130/0x570 [ 1363.971806] perf_event_alloc.part.0+0xd96/0x2b70 [ 1363.971832] __do_sys_perf_event_open+0x579/0x2e60 [ 1363.971855] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1363.971871] ? perf_event_set_output+0x5b0/0x5b0 [ 1363.971884] ? wait_for_completion_io+0x270/0x270 [ 1363.971919] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1363.971933] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1363.971950] do_syscall_64+0x33/0x40 [ 1363.971964] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1363.971974] RIP: 0033:0x7f08909a9b19 [ 1363.971987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.971995] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1363.972011] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1363.972024] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1363.972032] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 02:13:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1276, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1363.972041] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1363.972050] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1364.090228] FAULT_INJECTION: forcing a failure. [ 1364.090228] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.091464] CPU: 0 PID: 8057 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1364.092079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1364.092821] Call Trace: [ 1364.093071] dump_stack+0x107/0x167 [ 1364.093409] should_fail.cold+0x5/0xa [ 1364.093765] ? create_object.isra.0+0x3a/0xa20 [ 1364.094203] should_failslab+0x5/0x20 [ 1364.094559] kmem_cache_alloc+0x5b/0x310 [ 1364.094933] ? mark_held_locks+0x9e/0xe0 [ 1364.095309] create_object.isra.0+0x3a/0xa20 [ 1364.095714] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1364.096184] kmem_cache_alloc_trace+0x151/0x320 [ 1364.096624] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1364.097074] __list_lru_init+0x44d/0x890 [ 1364.097454] alloc_super+0x8b8/0xa90 [ 1364.097806] ? fput+0x20/0x20 [ 1364.098097] sget_fc+0x110/0x860 [ 1364.098435] ? set_anon_super+0xc0/0xc0 [ 1364.098800] ? rpc_kill_sb+0x1b0/0x1b0 [ 1364.099159] get_tree_keyed+0x55/0x210 [ 1364.099519] vfs_get_tree+0x8e/0x300 [ 1364.099863] path_mount+0x1429/0x2120 [ 1364.100224] ? strncpy_from_user+0x9e/0x470 [ 1364.100618] ? finish_automount+0xa90/0xa90 [ 1364.101015] ? getname_flags.part.0+0x1dd/0x4f0 [ 1364.101447] __x64_sys_mount+0x282/0x300 [ 1364.101815] ? copy_mnt_ns+0xa00/0xa00 [ 1364.102192] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1364.102673] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1364.103151] do_syscall_64+0x33/0x40 [ 1364.103499] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1364.103967] RIP: 0033:0x7fe8bba05b19 [ 1364.104317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1364.105946] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1364.106650] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1364.107285] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1364.107927] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1364.108575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1364.109219] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:13:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0x0, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:13:46 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 23) 02:13:46 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 25) 02:13:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:46 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2283, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:13:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0x0, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:13:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2201, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1364.229161] FAULT_INJECTION: forcing a failure. [ 1364.229161] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.230224] CPU: 0 PID: 8070 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1364.230841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1364.231578] Call Trace: [ 1364.231832] dump_stack+0x107/0x167 [ 1364.232169] should_fail.cold+0x5/0xa [ 1364.232530] ? create_object.isra.0+0x3a/0xa20 [ 1364.232946] should_failslab+0x5/0x20 [ 1364.233293] kmem_cache_alloc+0x5b/0x310 [ 1364.233669] create_object.isra.0+0x3a/0xa20 [ 1364.234074] kmemleak_alloc_percpu+0xa0/0x100 [ 1364.234502] pcpu_alloc+0x4e2/0x1240 [ 1364.234876] perf_trace_event_init+0x4ae/0x9c0 [ 1364.235306] perf_uprobe_init+0x173/0x210 [ 1364.235698] perf_uprobe_event_init+0xff/0x1d0 [ 1364.236110] perf_try_init_event+0x130/0x570 [ 1364.236513] perf_event_alloc.part.0+0xd96/0x2b70 [ 1364.236970] __do_sys_perf_event_open+0x579/0x2e60 [ 1364.237428] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1364.237879] ? perf_event_set_output+0x5b0/0x5b0 [ 1364.238322] ? wait_for_completion_io+0x270/0x270 [ 1364.238786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1364.239258] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1364.239726] do_syscall_64+0x33/0x40 [ 1364.240070] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1364.240535] RIP: 0033:0x7f229d85eb19 [ 1364.240873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1364.242531] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1364.243228] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1364.243871] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1364.244519] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1364.245158] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1364.245797] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:13:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1364.331129] FAULT_INJECTION: forcing a failure. [ 1364.331129] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.332240] CPU: 1 PID: 8064 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1364.332835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1364.333532] Call Trace: [ 1364.333763] dump_stack+0x107/0x167 [ 1364.334074] should_fail.cold+0x5/0xa [ 1364.334424] ? create_object.isra.0+0x3a/0xa20 [ 1364.334814] should_failslab+0x5/0x20 [ 1364.335139] kmem_cache_alloc+0x5b/0x310 [ 1364.335490] create_object.isra.0+0x3a/0xa20 [ 1364.335867] kmemleak_alloc_percpu+0xa0/0x100 [ 1364.336244] pcpu_alloc+0x4e2/0x1240 [ 1364.336583] perf_trace_event_init+0x376/0x9c0 [ 1364.336972] ? memdup_user+0x7c/0xd0 [ 1364.337289] perf_uprobe_init+0x173/0x210 [ 1364.337652] perf_uprobe_event_init+0xff/0x1d0 [ 1364.338033] perf_try_init_event+0x130/0x570 [ 1364.338421] perf_event_alloc.part.0+0xd96/0x2b70 [ 1364.338834] __do_sys_perf_event_open+0x579/0x2e60 [ 1364.339251] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1364.339659] ? perf_event_set_output+0x5b0/0x5b0 [ 1364.340054] ? wait_for_completion_io+0x270/0x270 [ 1364.340485] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1364.340922] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1364.341359] do_syscall_64+0x33/0x40 [ 1364.341676] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1364.342102] RIP: 0033:0x7f08909a9b19 [ 1364.342435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1364.343938] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1364.344574] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1364.345161] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1364.345752] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1364.346357] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1364.346946] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:13:59 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 24) 02:13:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1377.684776] FAULT_INJECTION: forcing a failure. [ 1377.684776] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.685870] CPU: 0 PID: 8098 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1377.686500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.687238] Call Trace: [ 1377.687491] dump_stack+0x107/0x167 [ 1377.687832] should_fail.cold+0x5/0xa [ 1377.688186] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1377.688655] should_failslab+0x5/0x20 [ 1377.689013] kmem_cache_alloc_trace+0x55/0x320 [ 1377.689436] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1377.689907] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1377.690380] __list_lru_init+0x44d/0x890 [ 1377.690401] alloc_super+0x8b8/0xa90 [ 1377.690416] ? fput+0x20/0x20 [ 1377.690427] sget_fc+0x110/0x860 [ 1377.690441] ? set_anon_super+0xc0/0xc0 [ 1377.692049] ? rpc_kill_sb+0x1b0/0x1b0 [ 1377.692409] get_tree_keyed+0x55/0x210 [ 1377.692766] vfs_get_tree+0x8e/0x300 [ 1377.693117] path_mount+0x1429/0x2120 [ 1377.693490] ? strncpy_from_user+0x9e/0x470 [ 1377.693880] ? finish_automount+0xa90/0xa90 [ 1377.694290] ? getname_flags.part.0+0x1dd/0x4f0 [ 1377.694731] __x64_sys_mount+0x282/0x300 [ 1377.695111] ? copy_mnt_ns+0xa00/0xa00 [ 1377.695494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.695513] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.695531] do_syscall_64+0x33/0x40 [ 1377.695546] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1377.695556] RIP: 0033:0x7fe8bba05b19 [ 1377.695570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.695578] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1377.695595] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1377.695604] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1377.695612] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.695620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1377.695629] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1377.726152] FAULT_INJECTION: forcing a failure. [ 1377.726152] name failslab, interval 1, probability 0, space 0, times 0 02:13:59 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 31) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:13:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0x0, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:13:59 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:13:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2202, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:13:59 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2284, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:00 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 26) 02:14:00 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 32) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1377.726195] CPU: 1 PID: 8104 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1377.726203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.726207] Call Trace: [ 1377.726222] dump_stack+0x107/0x167 [ 1377.730259] should_fail.cold+0x5/0xa [ 1377.730278] ? create_object.isra.0+0x3a/0xa20 [ 1377.730301] should_failslab+0x5/0x20 [ 1377.730316] kmem_cache_alloc+0x5b/0x310 [ 1377.730333] ? mark_held_locks+0x9e/0xe0 [ 1377.730351] create_object.isra.0+0x3a/0xa20 [ 1377.730374] kmemleak_alloc_percpu+0xa0/0x100 [ 1377.730392] pcpu_alloc+0x4e2/0x1240 [ 1377.730429] perf_trace_event_init+0x4ae/0x9c0 [ 1377.730451] perf_uprobe_init+0x173/0x210 [ 1377.730477] perf_uprobe_event_init+0xff/0x1d0 [ 1377.730491] perf_try_init_event+0x130/0x570 [ 1377.730509] perf_event_alloc.part.0+0xd96/0x2b70 02:14:00 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:14:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2203, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1377.730536] __do_sys_perf_event_open+0x579/0x2e60 [ 1377.730561] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1377.730577] ? perf_event_set_output+0x5b0/0x5b0 [ 1377.730591] ? wait_for_completion_io+0x270/0x270 [ 1377.730625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.730639] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.730656] do_syscall_64+0x33/0x40 [ 1377.730669] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1377.730678] RIP: 0033:0x7f229d85eb19 [ 1377.730692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.730700] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1377.730715] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1377.730724] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1377.730732] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.730741] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1377.730749] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1377.774943] FAULT_INJECTION: forcing a failure. [ 1377.774943] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.774960] CPU: 1 PID: 8106 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1377.774967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.774972] Call Trace: [ 1377.774989] dump_stack+0x107/0x167 [ 1377.775004] should_fail.cold+0x5/0xa [ 1377.775021] ? create_object.isra.0+0x3a/0xa20 [ 1377.775044] should_failslab+0x5/0x20 [ 1377.775061] kmem_cache_alloc+0x5b/0x310 [ 1377.775079] ? mark_held_locks+0x9e/0xe0 02:14:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x0, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1377.775097] create_object.isra.0+0x3a/0xa20 02:14:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2205, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1377.775119] kmemleak_alloc_percpu+0xa0/0x100 [ 1377.775138] pcpu_alloc+0x4e2/0x1240 [ 1377.775173] perf_trace_event_init+0x376/0x9c0 [ 1377.775194] ? memdup_user+0x7c/0xd0 [ 1377.775214] perf_uprobe_init+0x173/0x210 [ 1377.775238] perf_uprobe_event_init+0xff/0x1d0 02:14:00 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 27) 02:14:00 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 33) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1377.775252] perf_try_init_event+0x130/0x570 [ 1377.775269] perf_event_alloc.part.0+0xd96/0x2b70 [ 1377.775295] __do_sys_perf_event_open+0x579/0x2e60 [ 1377.775321] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1377.775337] ? perf_event_set_output+0x5b0/0x5b0 [ 1377.775351] ? wait_for_completion_io+0x270/0x270 02:14:00 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1377.775385] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.775398] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.775414] do_syscall_64+0x33/0x40 [ 1377.775427] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1377.775436] RIP: 0033:0x7f08909a9b19 02:14:00 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 25) [ 1377.775450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.775457] RSP: 002b:00007f088defe188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1377.775473] RAX: ffffffffffffffda RBX: 00007f0890abd020 RCX: 00007f08909a9b19 [ 1377.775482] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1377.775491] RBP: 00007f088defe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.775500] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1377.775509] R13: 00007fffb06a859f R14: 00007f088defe300 R15: 0000000000022000 [ 1377.810195] FAULT_INJECTION: forcing a failure. [ 1377.810195] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.810211] CPU: 0 PID: 8112 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1377.810219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.810223] Call Trace: [ 1377.810248] dump_stack+0x107/0x167 [ 1377.810264] should_fail.cold+0x5/0xa [ 1377.810281] ? create_object.isra.0+0x3a/0xa20 [ 1377.810301] should_failslab+0x5/0x20 [ 1377.810321] kmem_cache_alloc+0x5b/0x310 [ 1377.810338] ? mark_held_locks+0x9e/0xe0 [ 1377.810356] create_object.isra.0+0x3a/0xa20 [ 1377.810372] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1377.810393] kmem_cache_alloc_trace+0x151/0x320 [ 1377.810416] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1377.810435] __list_lru_init+0x44d/0x890 [ 1377.810457] alloc_super+0x8b8/0xa90 [ 1377.810472] ? fput+0x20/0x20 [ 1377.810484] sget_fc+0x110/0x860 [ 1377.810497] ? set_anon_super+0xc0/0xc0 [ 1377.810513] ? rpc_kill_sb+0x1b0/0x1b0 [ 1377.810527] get_tree_keyed+0x55/0x210 [ 1377.810543] vfs_get_tree+0x8e/0x300 [ 1377.810558] path_mount+0x1429/0x2120 [ 1377.810582] ? strncpy_from_user+0x9e/0x470 [ 1377.810598] ? finish_automount+0xa90/0xa90 [ 1377.810615] ? getname_flags.part.0+0x1dd/0x4f0 [ 1377.810638] __x64_sys_mount+0x282/0x300 [ 1377.810651] ? copy_mnt_ns+0xa00/0xa00 [ 1377.810670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.810685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.810701] do_syscall_64+0x33/0x40 [ 1377.810714] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1377.810723] RIP: 0033:0x7fe8bba05b19 [ 1377.810736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.810744] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1377.810759] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1377.810767] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1377.810775] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.810783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1377.810792] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1377.988458] FAULT_INJECTION: forcing a failure. [ 1377.988458] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.988475] CPU: 1 PID: 8123 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1377.988483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.988488] Call Trace: [ 1377.988509] dump_stack+0x107/0x167 [ 1377.988526] should_fail.cold+0x5/0xa [ 1377.988546] ? create_object.isra.0+0x3a/0xa20 [ 1377.988569] should_failslab+0x5/0x20 [ 1377.988587] kmem_cache_alloc+0x5b/0x310 [ 1377.988607] create_object.isra.0+0x3a/0xa20 [ 1377.988631] kmemleak_alloc_percpu+0xa0/0x100 [ 1377.988650] pcpu_alloc+0x4e2/0x1240 [ 1377.988685] perf_trace_event_init+0x4ae/0x9c0 [ 1377.988708] perf_uprobe_init+0x173/0x210 [ 1377.988733] perf_uprobe_event_init+0xff/0x1d0 [ 1377.988747] perf_try_init_event+0x130/0x570 [ 1377.988765] perf_event_alloc.part.0+0xd96/0x2b70 [ 1377.988791] __do_sys_perf_event_open+0x579/0x2e60 [ 1377.988815] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1377.988831] ? perf_event_set_output+0x5b0/0x5b0 [ 1377.988845] ? wait_for_completion_io+0x270/0x270 [ 1377.988886] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.988901] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.988918] do_syscall_64+0x33/0x40 [ 1377.988932] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1377.988942] RIP: 0033:0x7f229d85eb19 [ 1377.988956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.988964] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1377.988980] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1377.988988] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1377.988997] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.989005] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1377.989014] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1378.015082] FAULT_INJECTION: forcing a failure. [ 1378.015082] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.015093] FAULT_INJECTION: forcing a failure. [ 1378.015093] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.015103] CPU: 0 PID: 8129 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1378.015110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1378.015114] Call Trace: [ 1378.015129] dump_stack+0x107/0x167 [ 1378.015143] should_fail.cold+0x5/0xa [ 1378.015165] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1378.015180] should_failslab+0x5/0x20 [ 1378.015194] kmem_cache_alloc_trace+0x55/0x320 [ 1378.015209] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1378.015225] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1378.015242] __list_lru_init+0x44d/0x890 [ 1378.015260] alloc_super+0x8b8/0xa90 [ 1378.015274] ? fput+0x20/0x20 [ 1378.015285] sget_fc+0x110/0x860 [ 1378.015297] ? set_anon_super+0xc0/0xc0 [ 1378.015311] ? rpc_kill_sb+0x1b0/0x1b0 [ 1378.015325] get_tree_keyed+0x55/0x210 [ 1378.015339] vfs_get_tree+0x8e/0x300 [ 1378.015353] path_mount+0x1429/0x2120 [ 1378.015379] ? strncpy_from_user+0x9e/0x470 [ 1378.015392] ? finish_automount+0xa90/0xa90 [ 1378.015406] ? getname_flags.part.0+0x1dd/0x4f0 [ 1378.015427] __x64_sys_mount+0x282/0x300 [ 1378.015439] ? copy_mnt_ns+0xa00/0xa00 [ 1378.015458] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1378.015471] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1378.015487] do_syscall_64+0x33/0x40 [ 1378.015500] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1378.015508] RIP: 0033:0x7fe8bba05b19 [ 1378.015521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1378.015528] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1378.015542] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1378.015550] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1378.015557] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1378.015565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1378.015572] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1378.015601] CPU: 1 PID: 8125 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1378.015609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1378.015613] Call Trace: [ 1378.015627] dump_stack+0x107/0x167 [ 1378.015642] should_fail.cold+0x5/0xa [ 1378.015656] ? create_object.isra.0+0x3a/0xa20 [ 1378.015672] should_failslab+0x5/0x20 [ 1378.015685] kmem_cache_alloc+0x5b/0x310 [ 1378.015706] create_object.isra.0+0x3a/0xa20 [ 1378.015727] kmemleak_alloc_percpu+0xa0/0x100 [ 1378.015746] pcpu_alloc+0x4e2/0x1240 [ 1378.015778] perf_trace_event_init+0x376/0x9c0 [ 1378.015803] ? memdup_user+0x7c/0xd0 [ 1378.015825] perf_uprobe_init+0x173/0x210 [ 1378.015847] perf_uprobe_event_init+0xff/0x1d0 [ 1378.015860] perf_try_init_event+0x130/0x570 [ 1378.015876] perf_event_alloc.part.0+0xd96/0x2b70 [ 1378.015901] __do_sys_perf_event_open+0x579/0x2e60 [ 1378.015924] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1378.015944] ? perf_event_set_output+0x5b0/0x5b0 [ 1378.015957] ? wait_for_completion_io+0x270/0x270 [ 1378.015992] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1378.016005] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1378.016021] do_syscall_64+0x33/0x40 [ 1378.016036] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1378.016044] RIP: 0033:0x7f08909a9b19 [ 1378.016058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1378.016066] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1378.016080] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1378.016089] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1378.016098] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1378.016106] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1378.016115] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:14:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:00 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2270, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x0, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:14:00 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 34) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1378.219248] FAULT_INJECTION: forcing a failure. [ 1378.219248] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.220502] CPU: 1 PID: 8134 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1378.221236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1378.222146] Call Trace: [ 1378.222453] dump_stack+0x107/0x167 [ 1378.222858] should_fail.cold+0x5/0xa [ 1378.223282] ? create_object.isra.0+0x3a/0xa20 [ 1378.223796] should_failslab+0x5/0x20 [ 1378.224225] kmem_cache_alloc+0x5b/0x310 [ 1378.224687] ? mark_held_locks+0x9e/0xe0 [ 1378.225133] create_object.isra.0+0x3a/0xa20 [ 1378.225619] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1378.226136] kmem_cache_alloc_trace+0x151/0x320 [ 1378.226625] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1378.227126] __list_lru_init+0x44d/0x890 [ 1378.227549] alloc_super+0x8b8/0xa90 [ 1378.227935] ? fput+0x20/0x20 [ 1378.228255] sget_fc+0x110/0x860 [ 1378.228607] ? set_anon_super+0xc0/0xc0 [ 1378.229014] ? rpc_kill_sb+0x1b0/0x1b0 [ 1378.229414] get_tree_keyed+0x55/0x210 [ 1378.229807] vfs_get_tree+0x8e/0x300 [ 1378.230184] path_mount+0x1429/0x2120 [ 1378.230585] ? strncpy_from_user+0x9e/0x470 [ 1378.231021] ? finish_automount+0xa90/0xa90 [ 1378.231462] ? getname_flags.part.0+0x1dd/0x4f0 [ 1378.231942] __x64_sys_mount+0x282/0x300 [ 1378.232356] ? copy_mnt_ns+0xa00/0xa00 [ 1378.232756] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1378.233291] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1378.233808] do_syscall_64+0x33/0x40 [ 1378.234184] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1378.234693] RIP: 0033:0x7fe8bba05b19 [ 1378.235073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1378.236934] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1378.237705] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1378.242462] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1378.243177] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1378.243895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1378.244624] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1378.271450] blktrace: Concurrent blktraces are not allowed on sg0 02:14:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:13 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2285, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:13 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:14:13 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 28) 02:14:13 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 26) 02:14:13 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 35) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:14:13 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2271, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1391.570567] FAULT_INJECTION: forcing a failure. [ 1391.570567] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.571873] CPU: 1 PID: 8162 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1391.572539] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1391.573369] Call Trace: [ 1391.573634] dump_stack+0x107/0x167 [ 1391.574039] should_fail.cold+0x5/0xa 02:14:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x0, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1391.574429] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1391.575152] should_failslab+0x5/0x20 [ 1391.575188] kmem_cache_alloc_trace+0x55/0x320 [ 1391.575202] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1391.575216] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1391.575230] __list_lru_init+0x44d/0x890 [ 1391.575247] alloc_super+0x8b8/0xa90 [ 1391.575260] ? fput+0x20/0x20 [ 1391.575269] sget_fc+0x110/0x860 [ 1391.575280] ? set_anon_super+0xc0/0xc0 [ 1391.575293] ? rpc_kill_sb+0x1b0/0x1b0 [ 1391.575303] get_tree_keyed+0x55/0x210 [ 1391.575315] vfs_get_tree+0x8e/0x300 [ 1391.575327] path_mount+0x1429/0x2120 [ 1391.575347] ? strncpy_from_user+0x9e/0x470 [ 1391.575358] ? finish_automount+0xa90/0xa90 [ 1391.575370] ? getname_flags.part.0+0x1dd/0x4f0 [ 1391.575388] __x64_sys_mount+0x282/0x300 [ 1391.575398] ? copy_mnt_ns+0xa00/0xa00 [ 1391.575418] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1391.575433] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1391.575446] do_syscall_64+0x33/0x40 [ 1391.575458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1391.575467] RIP: 0033:0x7fe8bba05b19 [ 1391.575478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:14:13 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 36) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1391.575485] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1391.575498] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1391.575505] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1391.575511] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1391.575518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1391.575525] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1391.583814] FAULT_INJECTION: forcing a failure. [ 1391.583814] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.583830] CPU: 0 PID: 8160 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1391.583837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1391.583842] Call Trace: [ 1391.583862] dump_stack+0x107/0x167 [ 1391.583877] should_fail.cold+0x5/0xa [ 1391.583895] ? create_object.isra.0+0x3a/0xa20 [ 1391.583916] should_failslab+0x5/0x20 [ 1391.583935] kmem_cache_alloc+0x5b/0x310 [ 1391.583952] ? mark_held_locks+0x9e/0xe0 [ 1391.583966] create_object.isra.0+0x3a/0xa20 [ 1391.583988] kmemleak_alloc_percpu+0xa0/0x100 [ 1391.584003] pcpu_alloc+0x4e2/0x1240 [ 1391.584033] perf_trace_event_init+0x4ae/0x9c0 [ 1391.584051] perf_uprobe_init+0x173/0x210 [ 1391.584073] perf_uprobe_event_init+0xff/0x1d0 [ 1391.584085] perf_try_init_event+0x130/0x570 [ 1391.584099] perf_event_alloc.part.0+0xd96/0x2b70 [ 1391.584120] __do_sys_perf_event_open+0x579/0x2e60 [ 1391.584140] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1391.584153] ? perf_event_set_output+0x5b0/0x5b0 [ 1391.584165] ? wait_for_completion_io+0x270/0x270 [ 1391.584192] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1391.584204] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1391.584218] do_syscall_64+0x33/0x40 [ 1391.584230] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1391.584239] RIP: 0033:0x7f08909a9b19 [ 1391.584251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.584261] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1391.584274] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1391.584282] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1391.584288] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1391.584296] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1391.584307] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1391.602387] FAULT_INJECTION: forcing a failure. [ 1391.602387] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.602558] CPU: 1 PID: 8161 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1391.602565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1391.602569] Call Trace: [ 1391.602580] dump_stack+0x107/0x167 [ 1391.602594] should_fail.cold+0x5/0xa [ 1391.602609] ? create_object.isra.0+0x3a/0xa20 [ 1391.602623] should_failslab+0x5/0x20 [ 1391.602635] kmem_cache_alloc+0x5b/0x310 [ 1391.602651] create_object.isra.0+0x3a/0xa20 [ 1391.602664] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1391.602681] kmem_cache_alloc_trace+0x151/0x320 [ 1391.602705] register_for_each_vma+0x476/0xc00 [ 1391.602731] __uprobe_register+0x4df/0x880 [ 1391.602802] probe_event_enable+0x368/0xa20 [ 1391.602817] ? uprobe_perf_close+0x5f0/0x5f0 [ 1391.602838] trace_uprobe_register+0x54/0x730 [ 1391.602861] perf_trace_event_init+0x554/0x9c0 [ 1391.602880] perf_uprobe_init+0x173/0x210 [ 1391.602901] perf_uprobe_event_init+0xff/0x1d0 [ 1391.602912] perf_try_init_event+0x130/0x570 [ 1391.602927] perf_event_alloc.part.0+0xd96/0x2b70 [ 1391.602947] __do_sys_perf_event_open+0x579/0x2e60 [ 1391.602968] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1391.602987] ? perf_event_set_output+0x5b0/0x5b0 [ 1391.602998] ? wait_for_completion_io+0x270/0x270 [ 1391.603027] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1391.603038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1391.603052] do_syscall_64+0x33/0x40 [ 1391.603062] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1391.603070] RIP: 0033:0x7f229d85eb19 [ 1391.603081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.603088] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1391.603101] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1391.603107] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1391.603114] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1391.603121] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1391.603128] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1391.679116] FAULT_INJECTION: forcing a failure. [ 1391.679116] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.679146] CPU: 1 PID: 8167 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1391.709739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1391.710558] Call Trace: [ 1391.710855] dump_stack+0x107/0x167 [ 1391.711198] should_fail.cold+0x5/0xa [ 1391.711552] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1391.712075] should_failslab+0x5/0x20 [ 1391.712435] kmem_cache_alloc_trace+0x55/0x320 [ 1391.712938] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1391.713403] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1391.713927] __list_lru_init+0x44d/0x890 [ 1391.714311] alloc_super+0x8b8/0xa90 [ 1391.714671] ? fput+0x20/0x20 [ 1391.715013] sget_fc+0x110/0x860 [ 1391.715335] ? set_anon_super+0xc0/0xc0 [ 1391.715709] ? rpc_kill_sb+0x1b0/0x1b0 [ 1391.716118] get_tree_keyed+0x55/0x210 [ 1391.716492] vfs_get_tree+0x8e/0x300 [ 1391.716936] path_mount+0x1429/0x2120 [ 1391.717306] ? strncpy_from_user+0x9e/0x470 [ 1391.717713] ? finish_automount+0xa90/0xa90 [ 1391.718179] ? getname_flags.part.0+0x1dd/0x4f0 [ 1391.718629] __x64_sys_mount+0x282/0x300 [ 1391.719054] ? copy_mnt_ns+0xa00/0xa00 [ 1391.719431] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1391.720021] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1391.720507] do_syscall_64+0x33/0x40 [ 1391.721123] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1391.721601] RIP: 0033:0x7fe8bba05b19 [ 1391.722006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1391.723836] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1391.724535] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1391.725244] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1391.725961] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1391.726654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1391.727367] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:14:27 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 29) 02:14:27 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 37) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:14:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x0, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:14:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2272, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:27 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:14:27 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 27) 02:14:27 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2286, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1404.785389] FAULT_INJECTION: forcing a failure. [ 1404.785389] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.786545] CPU: 1 PID: 8176 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1404.787170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1404.787946] Call Trace: [ 1404.788178] dump_stack+0x107/0x167 [ 1404.788535] should_fail.cold+0x5/0xa [ 1404.791203] ? create_object.isra.0+0x3a/0xa20 [ 1404.791663] should_failslab+0x5/0x20 [ 1404.792059] kmem_cache_alloc+0x5b/0x310 [ 1404.792508] ? trace_hardirqs_on+0x5b/0x180 [ 1404.792923] create_object.isra.0+0x3a/0xa20 [ 1404.793509] kmemleak_alloc_percpu+0xa0/0x100 [ 1404.793966] pcpu_alloc+0x4e2/0x1240 [ 1404.794440] perf_trace_event_init+0x4ae/0x9c0 [ 1404.794893] perf_uprobe_init+0x173/0x210 [ 1404.795451] perf_uprobe_event_init+0xff/0x1d0 [ 1404.795883] perf_try_init_event+0x130/0x570 [ 1404.796256] perf_event_alloc.part.0+0xd96/0x2b70 [ 1404.796720] __do_sys_perf_event_open+0x579/0x2e60 [ 1404.797185] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1404.797640] ? perf_event_set_output+0x5b0/0x5b0 [ 1404.798112] ? wait_for_completion_io+0x270/0x270 [ 1404.798629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1404.799124] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1404.799608] do_syscall_64+0x33/0x40 [ 1404.802161] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1404.802689] RIP: 0033:0x7f229d85eb19 [ 1404.803082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1404.804777] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1404.805475] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1404.806116] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1404.806878] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1404.807522] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1404.808227] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1404.820704] FAULT_INJECTION: forcing a failure. [ 1404.820704] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.821914] CPU: 1 PID: 8187 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1404.822577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1404.823393] Call Trace: [ 1404.823625] dump_stack+0x107/0x167 [ 1404.824021] should_fail.cold+0x5/0xa [ 1404.824408] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1404.824896] should_failslab+0x5/0x20 [ 1404.825219] kmem_cache_alloc_trace+0x55/0x320 [ 1404.825654] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1404.826136] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1404.826642] __list_lru_init+0x44d/0x890 [ 1404.827038] alloc_super+0x8b8/0xa90 [ 1404.827409] ? fput+0x20/0x20 [ 1404.827676] sget_fc+0x110/0x860 [ 1404.828040] ? set_anon_super+0xc0/0xc0 [ 1404.828427] ? rpc_kill_sb+0x1b0/0x1b0 [ 1404.828803] get_tree_keyed+0x55/0x210 [ 1404.829136] vfs_get_tree+0x8e/0x300 [ 1404.829498] path_mount+0x1429/0x2120 [ 1404.829878] ? strncpy_from_user+0x9e/0x470 [ 1404.830242] ? finish_automount+0xa90/0xa90 [ 1404.830694] ? getname_flags.part.0+0x1dd/0x4f0 [ 1404.831141] __x64_sys_mount+0x282/0x300 [ 1404.831564] ? copy_mnt_ns+0xa00/0xa00 [ 1404.832032] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1404.832522] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1404.833063] do_syscall_64+0x33/0x40 [ 1404.833428] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1404.834267] RIP: 0033:0x7fe8bba05b19 [ 1404.834674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1404.836409] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1404.837116] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1404.837808] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1404.838484] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1404.839125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1404.839818] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:14:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2275, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:27 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1404.873820] FAULT_INJECTION: forcing a failure. [ 1404.873820] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.875668] CPU: 1 PID: 8189 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1404.876359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1404.877120] Call Trace: [ 1404.877419] dump_stack+0x107/0x167 [ 1404.877797] should_fail.cold+0x5/0xa [ 1404.878144] ? register_for_each_vma+0x476/0xc00 [ 1404.878635] should_failslab+0x5/0x20 [ 1404.879047] kmem_cache_alloc_trace+0x55/0x320 [ 1404.879508] register_for_each_vma+0x476/0xc00 [ 1404.879972] __uprobe_register+0x4df/0x880 [ 1404.880402] probe_event_enable+0x368/0xa20 [ 1404.880829] ? uprobe_perf_close+0x5f0/0x5f0 [ 1404.881217] trace_uprobe_register+0x54/0x730 [ 1404.881655] perf_trace_event_init+0x554/0x9c0 [ 1404.882101] perf_uprobe_init+0x173/0x210 [ 1404.882541] perf_uprobe_event_init+0xff/0x1d0 [ 1404.882971] perf_try_init_event+0x130/0x570 [ 1404.883399] perf_event_alloc.part.0+0xd96/0x2b70 [ 1404.883886] __do_sys_perf_event_open+0x579/0x2e60 [ 1404.884359] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1404.884820] ? perf_event_set_output+0x5b0/0x5b0 [ 1404.885219] ? wait_for_completion_io+0x270/0x270 [ 1404.885692] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1404.886184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1404.886716] do_syscall_64+0x33/0x40 [ 1404.887099] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1404.887616] RIP: 0033:0x7f08909a9b19 [ 1404.887999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1404.889719] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1404.890472] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1404.893540] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1404.894227] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1404.895004] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1404.895780] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:14:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2276, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:27 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 38) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1404.945721] FAULT_INJECTION: forcing a failure. [ 1404.945721] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.946812] CPU: 0 PID: 8206 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1404.947420] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1404.948140] Call Trace: [ 1404.948401] dump_stack+0x107/0x167 [ 1404.948745] should_fail.cold+0x5/0xa [ 1404.949083] ? create_object.isra.0+0x3a/0xa20 [ 1404.949491] should_failslab+0x5/0x20 [ 1404.949834] kmem_cache_alloc+0x5b/0x310 [ 1404.950198] ? mark_held_locks+0x9e/0xe0 [ 1404.950573] create_object.isra.0+0x3a/0xa20 [ 1404.950968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1404.951420] kmem_cache_alloc_trace+0x151/0x320 [ 1404.951837] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1404.952263] __list_lru_init+0x44d/0x890 [ 1404.952627] alloc_super+0x8b8/0xa90 [ 1404.952952] ? fput+0x20/0x20 [ 1404.953228] sget_fc+0x110/0x860 [ 1404.953527] ? set_anon_super+0xc0/0xc0 [ 1404.953877] ? rpc_kill_sb+0x1b0/0x1b0 [ 1404.954221] get_tree_keyed+0x55/0x210 [ 1404.954579] vfs_get_tree+0x8e/0x300 [ 1404.954901] path_mount+0x1429/0x2120 [ 1404.955240] ? strncpy_from_user+0x9e/0x470 [ 1404.955612] ? finish_automount+0xa90/0xa90 [ 1404.955987] ? getname_flags.part.0+0x1dd/0x4f0 [ 1404.956401] __x64_sys_mount+0x282/0x300 [ 1404.956756] ? copy_mnt_ns+0xa00/0xa00 [ 1404.957101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1404.957556] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1404.958003] do_syscall_64+0x33/0x40 [ 1404.958326] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1404.958780] RIP: 0033:0x7fe8bba05b19 [ 1404.959101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1404.960660] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1404.961317] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1404.961924] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1404.962556] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1404.963170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1404.963777] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:14:27 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 30) 02:14:27 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:14:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2279, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1405.049748] FAULT_INJECTION: forcing a failure. [ 1405.049748] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.050849] CPU: 1 PID: 8211 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1405.051464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1405.052189] Call Trace: [ 1405.052448] dump_stack+0x107/0x167 [ 1405.052795] should_fail.cold+0x5/0xa [ 1405.053159] ? create_object.isra.0+0x3a/0xa20 [ 1405.053582] should_failslab+0x5/0x20 [ 1405.053920] kmem_cache_alloc+0x5b/0x310 [ 1405.054278] ? mark_held_locks+0x9e/0xe0 [ 1405.054648] create_object.isra.0+0x3a/0xa20 [ 1405.055036] kmemleak_alloc_percpu+0xa0/0x100 [ 1405.055435] pcpu_alloc+0x4e2/0x1240 [ 1405.055779] perf_trace_event_init+0x4ae/0x9c0 [ 1405.056180] perf_uprobe_init+0x173/0x210 [ 1405.056551] perf_uprobe_event_init+0xff/0x1d0 [ 1405.056943] perf_try_init_event+0x130/0x570 [ 1405.057323] perf_event_alloc.part.0+0xd96/0x2b70 [ 1405.057751] __do_sys_perf_event_open+0x579/0x2e60 [ 1405.058185] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1405.058625] ? perf_event_set_output+0x5b0/0x5b0 [ 1405.059035] ? wait_for_completion_io+0x270/0x270 [ 1405.059465] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1405.059969] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1405.060411] do_syscall_64+0x33/0x40 [ 1405.060734] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1405.061169] RIP: 0033:0x7f229d85eb19 [ 1405.061495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1405.063059] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1405.063708] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1405.064317] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1405.064920] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1405.065523] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1405.066129] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:14:40 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 39) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:14:40 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 31) 02:14:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2287, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x0, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:14:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227a, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:40 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:14:40 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 28) [ 1418.103059] FAULT_INJECTION: forcing a failure. [ 1418.103059] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.105219] CPU: 0 PID: 8223 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1418.106424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1418.108196] Call Trace: [ 1418.108669] dump_stack+0x107/0x167 [ 1418.109320] should_fail.cold+0x5/0xa [ 1418.110000] ? create_object.isra.0+0x3a/0xa20 [ 1418.110836] should_failslab+0x5/0x20 [ 1418.111523] kmem_cache_alloc+0x5b/0x310 [ 1418.112258] create_object.isra.0+0x3a/0xa20 [ 1418.113055] kmemleak_alloc_percpu+0xa0/0x100 [ 1418.113853] pcpu_alloc+0x4e2/0x1240 [ 1418.114522] perf_trace_event_init+0x4ae/0x9c0 [ 1418.114949] perf_uprobe_init+0x173/0x210 [ 1418.115330] perf_uprobe_event_init+0xff/0x1d0 [ 1418.115735] perf_try_init_event+0x130/0x570 [ 1418.116125] perf_event_alloc.part.0+0xd96/0x2b70 [ 1418.116558] __do_sys_perf_event_open+0x579/0x2e60 [ 1418.116988] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1418.117400] ? perf_event_set_output+0x5b0/0x5b0 [ 1418.117804] ? wait_for_completion_io+0x270/0x270 [ 1418.118236] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1418.118852] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1418.119725] do_syscall_64+0x33/0x40 [ 1418.120354] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1418.121220] RIP: 0033:0x7f229d85eb19 [ 1418.121843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1418.125246] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1418.126601] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1418.127801] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1418.129001] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1418.130207] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1418.130999] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1418.134743] FAULT_INJECTION: forcing a failure. [ 1418.134743] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.135777] CPU: 0 PID: 8225 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1418.136375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1418.137092] Call Trace: [ 1418.137341] dump_stack+0x107/0x167 [ 1418.137678] should_fail.cold+0x5/0xa [ 1418.138020] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1418.138454] should_failslab+0x5/0x20 [ 1418.138838] kmem_cache_alloc_trace+0x55/0x320 [ 1418.139234] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1418.139673] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1418.140091] __list_lru_init+0x44d/0x890 [ 1418.140444] alloc_super+0x8b8/0xa90 [ 1418.140762] ? fput+0x20/0x20 [ 1418.141029] sget_fc+0x110/0x860 [ 1418.141318] ? set_anon_super+0xc0/0xc0 [ 1418.141659] ? rpc_kill_sb+0x1b0/0x1b0 [ 1418.141989] get_tree_keyed+0x55/0x210 [ 1418.142341] vfs_get_tree+0x8e/0x300 [ 1418.142693] path_mount+0x1429/0x2120 [ 1418.143025] ? strncpy_from_user+0x9e/0x470 [ 1418.143393] ? finish_automount+0xa90/0xa90 [ 1418.143760] ? getname_flags.part.0+0x1dd/0x4f0 [ 1418.144159] __x64_sys_mount+0x282/0x300 [ 1418.144503] ? copy_mnt_ns+0xa00/0xa00 [ 1418.144839] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1418.145284] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1418.145721] do_syscall_64+0x33/0x40 [ 1418.146037] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1418.146468] RIP: 0033:0x7fe8bba05b19 [ 1418.146794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1418.148321] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1418.148960] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1418.149556] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1418.150150] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1418.150778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1418.151376] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:14:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x0, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:40 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1418.206749] FAULT_INJECTION: forcing a failure. [ 1418.206749] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.208160] CPU: 1 PID: 8230 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1418.208841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1418.209601] Call Trace: [ 1418.209855] dump_stack+0x107/0x167 [ 1418.210170] should_fail.cold+0x5/0xa [ 1418.210550] ? create_object.isra.0+0x3a/0xa20 [ 1418.210965] should_failslab+0x5/0x20 [ 1418.211298] kmem_cache_alloc+0x5b/0x310 [ 1418.211664] create_object.isra.0+0x3a/0xa20 [ 1418.212110] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1418.212610] kmem_cache_alloc_trace+0x151/0x320 [ 1418.213084] register_for_each_vma+0x476/0xc00 [ 1418.213547] __uprobe_register+0x4df/0x880 [ 1418.213992] probe_event_enable+0x368/0xa20 [ 1418.214412] ? uprobe_perf_close+0x5f0/0x5f0 [ 1418.214865] trace_uprobe_register+0x54/0x730 [ 1418.215314] perf_trace_event_init+0x554/0x9c0 [ 1418.215735] perf_uprobe_init+0x173/0x210 [ 1418.216120] perf_uprobe_event_init+0xff/0x1d0 [ 1418.216515] perf_try_init_event+0x130/0x570 [ 1418.216905] perf_event_alloc.part.0+0xd96/0x2b70 [ 1418.217339] __do_sys_perf_event_open+0x579/0x2e60 [ 1418.217769] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1418.218193] ? perf_event_set_output+0x5b0/0x5b0 [ 1418.218621] ? wait_for_completion_io+0x270/0x270 [ 1418.219056] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1418.219517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1418.219959] do_syscall_64+0x33/0x40 [ 1418.220292] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1418.220728] RIP: 0033:0x7f08909a9b19 [ 1418.221087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1418.222858] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1418.223599] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1418.224282] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1418.224955] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1418.225590] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1418.226201] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1432.432668] FAULT_INJECTION: forcing a failure. [ 1432.432668] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.433856] CPU: 1 PID: 8260 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1432.434470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1432.435217] Call Trace: [ 1432.435468] dump_stack+0x107/0x167 [ 1432.435800] should_fail.cold+0x5/0xa [ 1432.436152] ? create_object.isra.0+0x3a/0xa20 [ 1432.436574] should_failslab+0x5/0x20 [ 1432.437343] kmem_cache_alloc+0x5b/0x310 [ 1432.438099] ? mark_held_locks+0x9e/0xe0 [ 1432.438877] create_object.isra.0+0x3a/0xa20 [ 1432.439686] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1432.440623] kmem_cache_alloc_trace+0x151/0x320 [ 1432.441479] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1432.442370] __list_lru_init+0x44d/0x890 [ 1432.443268] alloc_super+0x8b8/0xa90 [ 1432.443987] ? fput+0x20/0x20 [ 1432.444599] sget_fc+0x110/0x860 [ 1432.445259] ? set_anon_super+0xc0/0xc0 [ 1432.446051] ? rpc_kill_sb+0x1b0/0x1b0 [ 1432.446067] get_tree_keyed+0x55/0x210 [ 1432.446082] vfs_get_tree+0x8e/0x300 [ 1432.446096] path_mount+0x1429/0x2120 [ 1432.446119] ? strncpy_from_user+0x9e/0x470 [ 1432.446134] ? finish_automount+0xa90/0xa90 [ 1432.446149] ? getname_flags.part.0+0x1dd/0x4f0 [ 1432.446174] __x64_sys_mount+0x282/0x300 [ 1432.446187] ? copy_mnt_ns+0xa00/0xa00 [ 1432.446206] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1432.446223] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1432.446240] do_syscall_64+0x33/0x40 [ 1432.446255] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1432.446264] RIP: 0033:0x7fe8bba05b19 02:14:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227c, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:54 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 29) 02:14:54 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 32) 02:14:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x0, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:14:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2288, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:14:54 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 40) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:14:54 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1432.446278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1432.446286] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1432.446302] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 02:14:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227d, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227e, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1432.446311] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1432.446319] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.446328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 02:14:54 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1432.446337] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1432.474362] FAULT_INJECTION: forcing a failure. [ 1432.474362] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.474377] CPU: 1 PID: 8266 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1432.474385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1432.474389] Call Trace: [ 1432.474405] dump_stack+0x107/0x167 [ 1432.474422] should_fail.cold+0x5/0xa [ 1432.474439] ? create_object.isra.0+0x3a/0xa20 [ 1432.474460] should_failslab+0x5/0x20 [ 1432.474476] kmem_cache_alloc+0x5b/0x310 [ 1432.474493] create_object.isra.0+0x3a/0xa20 [ 1432.474515] kmemleak_alloc_percpu+0xa0/0x100 [ 1432.474532] pcpu_alloc+0x4e2/0x1240 [ 1432.474565] perf_trace_event_init+0x4ae/0x9c0 [ 1432.474589] perf_uprobe_init+0x173/0x210 [ 1432.474614] perf_uprobe_event_init+0xff/0x1d0 [ 1432.474628] perf_try_init_event+0x130/0x570 [ 1432.474646] perf_event_alloc.part.0+0xd96/0x2b70 02:14:54 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 41) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:14:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:14:54 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 33) [ 1432.474707] __do_sys_perf_event_open+0x579/0x2e60 [ 1432.474735] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1432.474752] ? perf_event_set_output+0x5b0/0x5b0 02:14:54 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 30) [ 1432.474767] ? wait_for_completion_io+0x270/0x270 [ 1432.474805] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1432.474819] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1432.474834] do_syscall_64+0x33/0x40 [ 1432.474849] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1432.474858] RIP: 0033:0x7f08909a9b19 [ 1432.474873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:14:55 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:14:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227f, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:14:55 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 42) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1432.474880] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 02:14:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1432.474896] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1432.474905] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1432.474914] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.474923] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1432.474932] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1432.512499] FAULT_INJECTION: forcing a failure. [ 1432.512499] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.512517] CPU: 1 PID: 8257 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1432.512525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1432.512529] Call Trace: [ 1432.512547] dump_stack+0x107/0x167 [ 1432.512564] should_fail.cold+0x5/0xa [ 1432.512583] ? create_object.isra.0+0x3a/0xa20 02:14:55 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 43) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1432.512606] should_failslab+0x5/0x20 [ 1432.512624] kmem_cache_alloc+0x5b/0x310 [ 1432.512641] ? mark_held_locks+0x9e/0xe0 [ 1432.512660] create_object.isra.0+0x3a/0xa20 [ 1432.512677] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1432.512699] kmem_cache_alloc_trace+0x151/0x320 [ 1432.512727] register_for_each_vma+0x476/0xc00 [ 1432.512762] __uprobe_register+0x4df/0x880 [ 1432.512799] probe_event_enable+0x368/0xa20 [ 1432.512817] ? uprobe_perf_close+0x5f0/0x5f0 [ 1432.512844] trace_uprobe_register+0x54/0x730 [ 1432.512871] perf_trace_event_init+0x554/0x9c0 [ 1432.512897] perf_uprobe_init+0x173/0x210 [ 1432.512921] perf_uprobe_event_init+0xff/0x1d0 [ 1432.512936] perf_try_init_event+0x130/0x570 [ 1432.512953] perf_event_alloc.part.0+0xd96/0x2b70 [ 1432.512980] __do_sys_perf_event_open+0x579/0x2e60 [ 1432.513008] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1432.513026] ? perf_event_set_output+0x5b0/0x5b0 [ 1432.513041] ? wait_for_completion_io+0x270/0x270 [ 1432.513079] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1432.513094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1432.513112] do_syscall_64+0x33/0x40 [ 1432.513128] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1432.513138] RIP: 0033:0x7f229d85eb19 [ 1432.513153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1432.513162] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1432.513178] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1432.513187] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1432.513197] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.513205] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1432.513215] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1432.639087] FAULT_INJECTION: forcing a failure. [ 1432.639087] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.639105] CPU: 1 PID: 8287 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1432.639113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1432.639118] Call Trace: [ 1432.639139] dump_stack+0x107/0x167 [ 1432.639156] should_fail.cold+0x5/0xa [ 1432.639177] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1432.639198] should_failslab+0x5/0x20 [ 1432.639216] kmem_cache_alloc_trace+0x55/0x320 [ 1432.639233] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1432.639252] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1432.639271] __list_lru_init+0x44d/0x890 [ 1432.639295] alloc_super+0x8b8/0xa90 [ 1432.639311] ? fput+0x20/0x20 [ 1432.639324] sget_fc+0x110/0x860 [ 1432.639337] ? set_anon_super+0xc0/0xc0 [ 1432.639353] ? rpc_kill_sb+0x1b0/0x1b0 [ 1432.639368] get_tree_keyed+0x55/0x210 [ 1432.639383] vfs_get_tree+0x8e/0x300 [ 1432.639398] path_mount+0x1429/0x2120 [ 1432.639422] ? strncpy_from_user+0x9e/0x470 [ 1432.639435] ? finish_automount+0xa90/0xa90 [ 1432.639451] ? getname_flags.part.0+0x1dd/0x4f0 [ 1432.639475] __x64_sys_mount+0x282/0x300 [ 1432.639489] ? copy_mnt_ns+0xa00/0xa00 [ 1432.639513] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1432.639531] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1432.639548] do_syscall_64+0x33/0x40 [ 1432.639563] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1432.639573] RIP: 0033:0x7fe8bba05b19 [ 1432.639588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1432.639596] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1432.639613] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1432.639621] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1432.639631] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.639639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1432.639649] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1432.715109] FAULT_INJECTION: forcing a failure. [ 1432.715109] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.715126] CPU: 0 PID: 8290 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1432.715134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1432.715139] Call Trace: [ 1432.715161] dump_stack+0x107/0x167 [ 1432.715178] should_fail.cold+0x5/0xa [ 1432.715197] ? create_object.isra.0+0x3a/0xa20 [ 1432.715218] should_failslab+0x5/0x20 [ 1432.715236] kmem_cache_alloc+0x5b/0x310 [ 1432.715256] create_object.isra.0+0x3a/0xa20 [ 1432.715281] kmemleak_alloc_percpu+0xa0/0x100 [ 1432.715303] pcpu_alloc+0x4e2/0x1240 [ 1432.715342] probe_event_enable+0x537/0xa20 [ 1432.715359] ? uprobe_perf_close+0x5f0/0x5f0 [ 1432.715373] ? pcpu_alloc+0x12a/0x1240 [ 1432.715396] trace_uprobe_register+0x54/0x730 [ 1432.715425] perf_trace_event_init+0x554/0x9c0 [ 1432.715451] perf_uprobe_init+0x173/0x210 [ 1432.715480] perf_uprobe_event_init+0xff/0x1d0 [ 1432.715494] perf_try_init_event+0x130/0x570 [ 1432.715513] perf_event_alloc.part.0+0xd96/0x2b70 [ 1432.715540] __do_sys_perf_event_open+0x579/0x2e60 [ 1432.715564] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1432.715581] ? perf_event_set_output+0x5b0/0x5b0 [ 1432.715596] ? wait_for_completion_io+0x270/0x270 [ 1432.715636] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1432.715651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1432.715668] do_syscall_64+0x33/0x40 [ 1432.715683] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1432.715693] RIP: 0033:0x7f229d85eb19 [ 1432.715708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1432.715717] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1432.715733] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1432.715742] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1432.715751] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.715760] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1432.715769] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1432.763583] FAULT_INJECTION: forcing a failure. [ 1432.763583] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.763598] CPU: 1 PID: 8294 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1432.763605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1432.763609] Call Trace: [ 1432.763627] dump_stack+0x107/0x167 [ 1432.763642] should_fail.cold+0x5/0xa [ 1432.763662] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1432.763682] should_failslab+0x5/0x20 [ 1432.763702] kmem_cache_alloc_trace+0x55/0x320 [ 1432.763718] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1432.763736] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1432.763754] __list_lru_init+0x44d/0x890 [ 1432.763775] alloc_super+0x8b8/0xa90 [ 1432.763790] ? fput+0x20/0x20 [ 1432.763802] sget_fc+0x110/0x860 [ 1432.763815] ? set_anon_super+0xc0/0xc0 [ 1432.763831] ? rpc_kill_sb+0x1b0/0x1b0 [ 1432.763844] get_tree_keyed+0x55/0x210 [ 1432.763858] vfs_get_tree+0x8e/0x300 [ 1432.763871] path_mount+0x1429/0x2120 [ 1432.763895] ? strncpy_from_user+0x9e/0x470 [ 1432.763910] ? finish_automount+0xa90/0xa90 [ 1432.763925] ? getname_flags.part.0+0x1dd/0x4f0 [ 1432.763949] __x64_sys_mount+0x282/0x300 [ 1432.763962] ? copy_mnt_ns+0xa00/0xa00 [ 1432.763985] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1432.764002] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1432.764019] do_syscall_64+0x33/0x40 [ 1432.764033] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1432.764043] RIP: 0033:0x7fe8bba05b19 [ 1432.764056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1432.764064] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1432.764081] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1432.764089] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1432.764098] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.764106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1432.764115] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1432.786102] FAULT_INJECTION: forcing a failure. [ 1432.786102] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.786118] CPU: 1 PID: 8292 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1432.786126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1432.786131] Call Trace: [ 1432.786146] dump_stack+0x107/0x167 [ 1432.786163] should_fail.cold+0x5/0xa [ 1432.786181] ? create_object.isra.0+0x3a/0xa20 [ 1432.786199] should_failslab+0x5/0x20 [ 1432.786213] kmem_cache_alloc+0x5b/0x310 [ 1432.786228] ? mark_held_locks+0x9e/0xe0 [ 1432.786248] create_object.isra.0+0x3a/0xa20 [ 1432.786265] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1432.786290] kmem_cache_alloc_trace+0x151/0x320 [ 1432.786321] register_for_each_vma+0x476/0xc00 [ 1432.786357] __uprobe_register+0x4df/0x880 [ 1432.786396] probe_event_enable+0x368/0xa20 [ 1432.786413] ? uprobe_perf_close+0x5f0/0x5f0 [ 1432.786439] trace_uprobe_register+0x54/0x730 [ 1432.786469] perf_trace_event_init+0x554/0x9c0 [ 1432.786495] perf_uprobe_init+0x173/0x210 [ 1432.786521] perf_uprobe_event_init+0xff/0x1d0 [ 1432.786536] perf_try_init_event+0x130/0x570 [ 1432.786554] perf_event_alloc.part.0+0xd96/0x2b70 [ 1432.786583] __do_sys_perf_event_open+0x579/0x2e60 [ 1432.786609] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1432.786627] ? perf_event_set_output+0x5b0/0x5b0 [ 1432.786641] ? wait_for_completion_io+0x270/0x270 [ 1432.786688] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1432.786703] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1432.786719] do_syscall_64+0x33/0x40 [ 1432.786733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1432.786742] RIP: 0033:0x7f08909a9b19 [ 1432.786756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1432.786764] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1432.786778] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1432.786785] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1432.786793] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.786802] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1432.786811] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1432.874515] FAULT_INJECTION: forcing a failure. [ 1432.874515] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.874533] CPU: 0 PID: 8304 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1432.874541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1432.874545] Call Trace: [ 1432.874566] dump_stack+0x107/0x167 [ 1432.874582] should_fail.cold+0x5/0xa [ 1432.874602] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1432.874625] should_failslab+0x5/0x20 [ 1432.874644] kmem_cache_alloc_trace+0x55/0x320 [ 1432.874668] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1432.874687] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1432.874706] __list_lru_init+0x44d/0x890 [ 1432.874727] alloc_super+0x8b8/0xa90 [ 1432.874743] ? fput+0x20/0x20 [ 1432.874754] sget_fc+0x110/0x860 [ 1432.874767] ? set_anon_super+0xc0/0xc0 [ 1432.874783] ? rpc_kill_sb+0x1b0/0x1b0 [ 1432.874798] get_tree_keyed+0x55/0x210 [ 1432.874813] vfs_get_tree+0x8e/0x300 [ 1432.874827] path_mount+0x1429/0x2120 [ 1432.874851] ? strncpy_from_user+0x9e/0x470 [ 1432.874865] ? finish_automount+0xa90/0xa90 [ 1432.874881] ? getname_flags.part.0+0x1dd/0x4f0 [ 1432.874905] __x64_sys_mount+0x282/0x300 [ 1432.874919] ? copy_mnt_ns+0xa00/0xa00 [ 1432.874941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1432.874959] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1432.874977] do_syscall_64+0x33/0x40 [ 1432.874991] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1432.875001] RIP: 0033:0x7fe8bba05b19 [ 1432.875016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1432.875026] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1432.875044] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1432.875052] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1432.875061] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1432.875069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1432.875079] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1445.872938] FAULT_INJECTION: forcing a failure. [ 1445.872938] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.874008] CPU: 1 PID: 8312 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1445.874589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.875303] Call Trace: [ 1445.875540] dump_stack+0x107/0x167 [ 1445.875854] should_fail.cold+0x5/0xa [ 1445.876185] ? create_object.isra.0+0x3a/0xa20 [ 1445.876584] should_failslab+0x5/0x20 [ 1445.876916] kmem_cache_alloc+0x5b/0x310 [ 1445.877269] ? mark_held_locks+0x9e/0xe0 [ 1445.877623] create_object.isra.0+0x3a/0xa20 [ 1445.878003] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1445.878445] kmem_cache_alloc_trace+0x151/0x320 [ 1445.878868] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1445.879293] __list_lru_init+0x44d/0x890 [ 1445.879646] alloc_super+0x8b8/0xa90 [ 1445.879966] ? fput+0x20/0x20 [ 1445.880234] sget_fc+0x110/0x860 [ 1445.880526] ? set_anon_super+0xc0/0xc0 [ 1445.880871] ? rpc_kill_sb+0x1b0/0x1b0 [ 1445.881205] get_tree_keyed+0x55/0x210 [ 1445.881544] vfs_get_tree+0x8e/0x300 [ 1445.881865] path_mount+0x1429/0x2120 [ 1445.882201] ? strncpy_from_user+0x9e/0x470 [ 1445.882571] ? finish_automount+0xa90/0xa90 [ 1445.882974] ? getname_flags.part.0+0x1dd/0x4f0 [ 1445.883382] __x64_sys_mount+0x282/0x300 [ 1445.883728] ? copy_mnt_ns+0xa00/0xa00 [ 1445.884066] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1445.884517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1445.884957] do_syscall_64+0x33/0x40 [ 1445.885279] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1445.885714] RIP: 0033:0x7fe8bba05b19 [ 1445.886033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1445.887615] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1445.888266] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1445.888869] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1445.889472] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.890073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1445.890727] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1445.909048] FAULT_INJECTION: forcing a failure. [ 1445.909048] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.910228] CPU: 1 PID: 8315 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1445.910932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.911778] Call Trace: [ 1445.912061] dump_stack+0x107/0x167 [ 1445.912432] should_fail.cold+0x5/0xa [ 1445.912819] ? create_object.isra.0+0x3a/0xa20 [ 1445.913281] should_failslab+0x5/0x20 [ 1445.913671] kmem_cache_alloc+0x5b/0x310 [ 1445.914066] ? mark_held_locks+0x9e/0xe0 [ 1445.914465] create_object.isra.0+0x3a/0xa20 [ 1445.914907] kmemleak_alloc_percpu+0xa0/0x100 [ 1445.915354] pcpu_alloc+0x4e2/0x1240 [ 1445.915749] probe_event_enable+0x537/0xa20 [ 1445.916174] ? uprobe_perf_close+0x5f0/0x5f0 [ 1445.916631] ? pcpu_alloc+0x12a/0x1240 [ 1445.917034] trace_uprobe_register+0x54/0x730 [ 1445.917501] perf_trace_event_init+0x554/0x9c0 [ 1445.917968] perf_uprobe_init+0x173/0x210 [ 1445.918393] perf_uprobe_event_init+0xff/0x1d0 [ 1445.918882] perf_try_init_event+0x130/0x570 [ 1445.919341] perf_event_alloc.part.0+0xd96/0x2b70 [ 1445.919830] __do_sys_perf_event_open+0x579/0x2e60 [ 1445.920329] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1445.920815] ? perf_event_set_output+0x5b0/0x5b0 [ 1445.921281] ? wait_for_completion_io+0x270/0x270 02:15:08 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 31) 02:15:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x2289, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:08 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:15:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:15:08 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 34) 02:15:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2282, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:08 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 44) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1445.921781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1445.922278] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1445.922712] do_syscall_64+0x33/0x40 [ 1445.923036] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1445.923466] RIP: 0033:0x7f229d85eb19 [ 1445.923782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1445.925317] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 02:15:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1445.925966] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1445.934992] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1445.935716] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.936452] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1445.937195] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:15:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2283, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1445.983079] FAULT_INJECTION: forcing a failure. [ 1445.983079] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.984794] CPU: 1 PID: 8313 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1445.986388] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1445.988264] Call Trace: [ 1445.988864] dump_stack+0x107/0x167 [ 1445.989731] should_fail.cold+0x5/0xa 02:15:08 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:15:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1445.990582] ? register_for_each_vma+0x476/0xc00 [ 1445.991476] should_failslab+0x5/0x20 [ 1445.992326] kmem_cache_alloc_trace+0x55/0x320 [ 1445.993325] register_for_each_vma+0x476/0xc00 [ 1445.994329] __uprobe_register+0x4df/0x880 [ 1445.995281] probe_event_enable+0x368/0xa20 [ 1445.996258] ? uprobe_perf_close+0x5f0/0x5f0 [ 1445.997223] trace_uprobe_register+0x54/0x730 [ 1445.998208] perf_trace_event_init+0x554/0x9c0 [ 1445.999233] perf_uprobe_init+0x173/0x210 [ 1446.000141] perf_uprobe_event_init+0xff/0x1d0 [ 1446.001128] perf_try_init_event+0x130/0x570 [ 1446.002084] perf_event_alloc.part.0+0xd96/0x2b70 [ 1446.003160] __do_sys_perf_event_open+0x579/0x2e60 [ 1446.004231] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1446.005279] ? perf_event_set_output+0x5b0/0x5b0 [ 1446.006309] ? wait_for_completion_io+0x270/0x270 [ 1446.007412] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1446.008547] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1446.009667] do_syscall_64+0x33/0x40 [ 1446.010473] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1446.011601] RIP: 0033:0x7f08909a9b19 [ 1446.012406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.016433] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1446.018099] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1446.019107] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1446.019709] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.020305] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1446.020901] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:15:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:15:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2284, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:08 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 45) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:15:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x4b47, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1446.078862] FAULT_INJECTION: forcing a failure. [ 1446.078862] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.080025] CPU: 0 PID: 8338 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1446.080685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1446.081495] Call Trace: [ 1446.081769] dump_stack+0x107/0x167 [ 1446.082125] should_fail.cold+0x5/0xa [ 1446.082511] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1446.083031] should_failslab+0x5/0x20 [ 1446.083423] kmem_cache_alloc_trace+0x55/0x320 [ 1446.083887] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1446.084404] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1446.084917] __list_lru_init+0x44d/0x890 [ 1446.085339] alloc_super+0x8b8/0xa90 [ 1446.085721] ? fput+0x20/0x20 [ 1446.086458] sget_fc+0x110/0x860 [ 1446.086840] ? set_anon_super+0xc0/0xc0 [ 1446.087284] ? rpc_kill_sb+0x1b0/0x1b0 [ 1446.087722] get_tree_keyed+0x55/0x210 [ 1446.088147] vfs_get_tree+0x8e/0x300 [ 1446.088542] path_mount+0x1429/0x2120 [ 1446.088967] ? strncpy_from_user+0x9e/0x470 [ 1446.089428] ? finish_automount+0xa90/0xa90 [ 1446.089898] ? getname_flags.part.0+0x1dd/0x4f0 [ 1446.090408] __x64_sys_mount+0x282/0x300 [ 1446.090878] ? copy_mnt_ns+0xa00/0xa00 [ 1446.091319] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1446.091881] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1446.092430] do_syscall_64+0x33/0x40 [ 1446.092838] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1446.093384] RIP: 0033:0x7fe8bba05b19 [ 1446.093799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.095499] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1446.096157] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1446.096772] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1446.097387] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.098009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1446.098631] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1459.263597] FAULT_INJECTION: forcing a failure. [ 1459.263597] name failslab, interval 1, probability 0, space 0, times 0 [ 1459.264686] CPU: 0 PID: 8354 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1459.265302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1459.266048] Call Trace: [ 1459.266301] dump_stack+0x107/0x167 [ 1459.266640] should_fail.cold+0x5/0xa [ 1459.267020] ? create_object.isra.0+0x3a/0xa20 [ 1459.267046] should_failslab+0x5/0x20 [ 1459.267068] kmem_cache_alloc+0x5b/0x310 [ 1459.267089] ? mark_held_locks+0x9e/0xe0 [ 1459.267108] create_object.isra.0+0x3a/0xa20 [ 1459.267125] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1459.267146] kmem_cache_alloc_trace+0x151/0x320 [ 1459.267168] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1459.267187] __list_lru_init+0x44d/0x890 [ 1459.267209] alloc_super+0x8b8/0xa90 [ 1459.267225] ? fput+0x20/0x20 [ 1459.267237] sget_fc+0x110/0x860 [ 1459.267251] ? set_anon_super+0xc0/0xc0 [ 1459.267267] ? rpc_kill_sb+0x1b0/0x1b0 [ 1459.267281] get_tree_keyed+0x55/0x210 [ 1459.267296] vfs_get_tree+0x8e/0x300 [ 1459.267310] path_mount+0x1429/0x2120 [ 1459.267334] ? strncpy_from_user+0x9e/0x470 [ 1459.267349] ? finish_automount+0xa90/0xa90 [ 1459.267365] ? getname_flags.part.0+0x1dd/0x4f0 [ 1459.267390] __x64_sys_mount+0x282/0x300 [ 1459.267404] ? copy_mnt_ns+0xa00/0xa00 [ 1459.267423] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1459.267441] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1459.267458] do_syscall_64+0x33/0x40 [ 1459.267472] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1459.267482] RIP: 0033:0x7fe8bba05b19 [ 1459.267498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1459.267506] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1459.267523] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1459.267532] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1459.267541] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.267550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1459.267560] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1459.271878] FAULT_INJECTION: forcing a failure. [ 1459.271878] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1459.288837] CPU: 0 PID: 8356 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1459.289441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1459.290186] Call Trace: [ 1459.290434] dump_stack+0x107/0x167 [ 1459.290776] should_fail.cold+0x5/0xa [ 1459.291154] __alloc_pages_nodemask+0x182/0x600 [ 1459.291583] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1459.291998] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1459.292504] ? pcpu_alloc+0x12a/0x1240 [ 1459.292827] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1459.293313] probe_event_enable+0x5b1/0xa20 [ 1459.293713] ? uprobe_perf_close+0x5f0/0x5f0 [ 1459.294107] trace_uprobe_register+0x54/0x730 [ 1459.299288] perf_trace_event_init+0x554/0x9c0 [ 1459.299723] perf_uprobe_init+0x173/0x210 [ 1459.300120] perf_uprobe_event_init+0xff/0x1d0 [ 1459.300536] perf_try_init_event+0x130/0x570 [ 1459.300937] perf_event_alloc.part.0+0xd96/0x2b70 [ 1459.301387] __do_sys_perf_event_open+0x579/0x2e60 [ 1459.301841] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1459.302278] ? perf_event_set_output+0x5b0/0x5b0 [ 1459.302713] ? wait_for_completion_io+0x270/0x270 [ 1459.303192] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1459.303663] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1459.304138] do_syscall_64+0x33/0x40 [ 1459.304458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1459.304898] RIP: 0033:0x7f229d85eb19 [ 1459.305215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1459.306763] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1459.307419] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1459.308021] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1459.308622] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.309223] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1459.309826] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:15:21 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 32) 02:15:21 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 46) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:15:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:15:21 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:15:21 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 35) 02:15:21 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2285, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x4b49, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:21 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2286, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:21 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:15:21 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 47) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1459.368237] FAULT_INJECTION: forcing a failure. [ 1459.368237] name failslab, interval 1, probability 0, space 0, times 0 [ 1459.369327] CPU: 1 PID: 8367 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1459.369898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1459.370621] Call Trace: [ 1459.370873] dump_stack+0x107/0x167 [ 1459.371215] should_fail.cold+0x5/0xa [ 1459.371567] ? create_object.isra.0+0x3a/0xa20 [ 1459.371991] should_failslab+0x5/0x20 [ 1459.372347] kmem_cache_alloc+0x5b/0x310 [ 1459.372722] create_object.isra.0+0x3a/0xa20 [ 1459.373134] kmemleak_alloc_percpu+0xa0/0x100 [ 1459.373548] pcpu_alloc+0x4e2/0x1240 [ 1459.373913] perf_trace_event_init+0x4ae/0x9c0 02:15:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5382, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:21 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d300000", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1459.374338] perf_uprobe_init+0x173/0x210 [ 1459.379071] perf_uprobe_event_init+0xff/0x1d0 [ 1459.379495] perf_try_init_event+0x130/0x570 [ 1459.379909] perf_event_alloc.part.0+0xd96/0x2b70 [ 1459.380364] __do_sys_perf_event_open+0x579/0x2e60 [ 1459.380821] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1459.381261] ? perf_event_set_output+0x5b0/0x5b0 [ 1459.381699] ? wait_for_completion_io+0x270/0x270 [ 1459.382171] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 02:15:21 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2287, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1459.382654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1459.399156] do_syscall_64+0x33/0x40 [ 1459.399477] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1459.399908] RIP: 0033:0x7f08909a9b19 [ 1459.400225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1459.401760] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1459.402399] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1459.403019] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1459.403618] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.404214] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1459.404813] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1459.443908] FAULT_INJECTION: forcing a failure. [ 1459.443908] name failslab, interval 1, probability 0, space 0, times 0 [ 1459.444912] CPU: 1 PID: 8381 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1459.445484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1459.446173] Call Trace: [ 1459.446402] dump_stack+0x107/0x167 [ 1459.446713] should_fail.cold+0x5/0xa [ 1459.463071] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1459.463506] should_failslab+0x5/0x20 [ 1459.463833] kmem_cache_alloc_trace+0x55/0x320 [ 1459.464228] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1459.464657] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1459.465073] __list_lru_init+0x44d/0x890 [ 1459.465421] alloc_super+0x8b8/0xa90 [ 1459.465737] ? fput+0x20/0x20 [ 1459.466002] sget_fc+0x110/0x860 [ 1459.466288] ? set_anon_super+0xc0/0xc0 [ 1459.466626] ? rpc_kill_sb+0x1b0/0x1b0 [ 1459.466976] get_tree_keyed+0x55/0x210 [ 1459.467306] vfs_get_tree+0x8e/0x300 [ 1459.467622] path_mount+0x1429/0x2120 [ 1459.467954] ? strncpy_from_user+0x9e/0x470 [ 1459.468319] ? finish_automount+0xa90/0xa90 [ 1459.468686] ? getname_flags.part.0+0x1dd/0x4f0 [ 1459.469084] __x64_sys_mount+0x282/0x300 [ 1459.469429] ? copy_mnt_ns+0xa00/0xa00 [ 1459.469768] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1459.470210] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1459.470647] do_syscall_64+0x33/0x40 [ 1459.470982] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1459.471418] RIP: 0033:0x7fe8bba05b19 [ 1459.471734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1459.473268] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1459.473907] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1459.474504] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1459.475115] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.475712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1459.476309] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:15:21 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 36) 02:15:21 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2288, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1459.583573] FAULT_INJECTION: forcing a failure. [ 1459.583573] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1459.584664] CPU: 0 PID: 8391 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1459.585237] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1459.585929] Call Trace: [ 1459.586163] dump_stack+0x107/0x167 [ 1459.586477] should_fail.cold+0x5/0xa [ 1459.586811] __alloc_pages_nodemask+0x182/0x600 [ 1459.587229] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1459.587629] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1459.588154] ? lockdep_init_map_type+0x2c7/0x780 [ 1459.588561] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1459.589005] ? __raw_spin_lock_init+0x36/0x110 [ 1459.589410] probe_event_enable+0x5b1/0xa20 [ 1459.589785] ? uprobe_perf_close+0x5f0/0x5f0 [ 1459.590172] trace_uprobe_register+0x54/0x730 [ 1459.590569] perf_trace_event_init+0x554/0x9c0 [ 1459.590986] perf_uprobe_init+0x173/0x210 [ 1459.591362] perf_uprobe_event_init+0xff/0x1d0 [ 1459.591753] perf_try_init_event+0x130/0x570 [ 1459.592134] perf_event_alloc.part.0+0xd96/0x2b70 [ 1459.592556] __do_sys_perf_event_open+0x579/0x2e60 [ 1459.592983] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1459.593397] ? perf_event_set_output+0x5b0/0x5b0 [ 1459.593804] ? wait_for_completion_io+0x270/0x270 [ 1459.594233] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1459.594682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1459.595139] do_syscall_64+0x33/0x40 [ 1459.595458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1459.595893] RIP: 0033:0x7f229d85eb19 [ 1459.596211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1459.597760] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1459.598409] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1459.599027] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1459.599629] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.600234] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1459.600836] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:15:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2289, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5385, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:35 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 37) 02:15:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:15:35 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d300000", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:15:35 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 48) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:15:35 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 33) [ 1472.970979] FAULT_INJECTION: forcing a failure. [ 1472.970979] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.972072] CPU: 1 PID: 8406 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1472.972651] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1472.973349] Call Trace: [ 1472.973583] dump_stack+0x107/0x167 [ 1472.973897] should_fail.cold+0x5/0xa [ 1472.974227] ? create_object.isra.0+0x3a/0xa20 [ 1472.974631] should_failslab+0x5/0x20 [ 1472.974962] kmem_cache_alloc+0x5b/0x310 [ 1472.975179] FAULT_INJECTION: forcing a failure. [ 1472.975179] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1472.975329] ? mark_held_locks+0x9e/0xe0 [ 1472.975346] create_object.isra.0+0x3a/0xa20 [ 1472.975369] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1472.977474] kmem_cache_alloc_trace+0x151/0x320 [ 1472.977877] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1472.978299] __list_lru_init+0x44d/0x890 [ 1472.978651] alloc_super+0x8b8/0xa90 [ 1472.978970] ? fput+0x20/0x20 [ 1472.979253] sget_fc+0x110/0x860 [ 1472.979541] ? set_anon_super+0xc0/0xc0 [ 1472.979877] ? rpc_kill_sb+0x1b0/0x1b0 [ 1472.980206] get_tree_keyed+0x55/0x210 [ 1472.980536] vfs_get_tree+0x8e/0x300 [ 1472.980850] path_mount+0x1429/0x2120 [ 1472.981179] ? strncpy_from_user+0x9e/0x470 [ 1472.981546] ? finish_automount+0xa90/0xa90 [ 1472.981910] ? getname_flags.part.0+0x1dd/0x4f0 [ 1472.982308] __x64_sys_mount+0x282/0x300 [ 1472.982649] ? copy_mnt_ns+0xa00/0xa00 [ 1472.982996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1472.983450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1472.983886] do_syscall_64+0x33/0x40 [ 1472.984203] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1472.984636] RIP: 0033:0x7fe8bba05b19 [ 1472.984952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1472.986491] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1472.987149] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1472.987751] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1472.988353] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1472.988952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1472.989553] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1472.990174] CPU: 0 PID: 8409 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1472.990763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1472.991480] Call Trace: [ 1472.991715] dump_stack+0x107/0x167 [ 1472.992024] should_fail.cold+0x5/0xa [ 1472.992357] __alloc_pages_nodemask+0x182/0x600 [ 1472.992753] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1472.993144] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1472.993652] ? lockdep_init_map_type+0x2c7/0x780 [ 1472.994049] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1472.994481] ? __raw_spin_lock_init+0x36/0x110 [ 1472.994872] probe_event_enable+0x5b1/0xa20 [ 1472.995266] ? uprobe_perf_close+0x5f0/0x5f0 [ 1472.995645] trace_uprobe_register+0x54/0x730 [ 1472.996027] perf_trace_event_init+0x554/0x9c0 [ 1472.996417] perf_uprobe_init+0x173/0x210 [ 1472.996771] perf_uprobe_event_init+0xff/0x1d0 [ 1472.997155] perf_try_init_event+0x130/0x570 [ 1472.997533] perf_event_alloc.part.0+0xd96/0x2b70 [ 1472.997947] __do_sys_perf_event_open+0x579/0x2e60 [ 1472.998369] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1472.998776] ? perf_event_set_output+0x5b0/0x5b0 [ 1472.999191] ? wait_for_completion_io+0x270/0x270 [ 1472.999615] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1473.000169] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1473.001041] do_syscall_64+0x33/0x40 [ 1473.001663] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1473.002525] RIP: 0033:0x7f229d85eb19 [ 1473.003210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1473.006410] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1473.007352] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1473.007946] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1473.008539] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.009132] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1473.009725] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:15:35 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d300000", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1473.037502] FAULT_INJECTION: forcing a failure. [ 1473.037502] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.038667] CPU: 1 PID: 8412 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1473.039342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1473.040174] Call Trace: [ 1473.040445] dump_stack+0x107/0x167 [ 1473.040826] should_fail.cold+0x5/0xa [ 1473.041211] ? create_object.isra.0+0x3a/0xa20 [ 1473.041678] should_failslab+0x5/0x20 [ 1473.042067] kmem_cache_alloc+0x5b/0x310 [ 1473.042485] create_object.isra.0+0x3a/0xa20 [ 1473.042934] kmemleak_alloc_percpu+0xa0/0x100 [ 1473.043351] pcpu_alloc+0x4e2/0x1240 [ 1473.043697] probe_event_enable+0x537/0xa20 [ 1473.044064] ? uprobe_perf_close+0x5f0/0x5f0 [ 1473.044438] ? pcpu_alloc+0x12a/0x1240 [ 1473.044774] trace_uprobe_register+0x54/0x730 [ 1473.045167] perf_trace_event_init+0x554/0x9c0 [ 1473.045562] perf_uprobe_init+0x173/0x210 [ 1473.045926] perf_uprobe_event_init+0xff/0x1d0 [ 1473.046313] perf_try_init_event+0x130/0x570 [ 1473.046696] perf_event_alloc.part.0+0xd96/0x2b70 [ 1473.047130] __do_sys_perf_event_open+0x579/0x2e60 [ 1473.047634] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1473.048118] ? perf_event_set_output+0x5b0/0x5b0 [ 1473.048606] ? wait_for_completion_io+0x270/0x270 [ 1473.049108] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1473.049635] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1473.050149] do_syscall_64+0x33/0x40 [ 1473.050525] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1473.051044] RIP: 0033:0x7f08909a9b19 [ 1473.051423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1473.053280] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1473.054049] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1473.054775] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1473.055464] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.056181] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1473.056896] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:15:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x4b47, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:35 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 49) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:15:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x4b49, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:35 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 38) 02:15:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:15:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5386, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:35 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d3000000800", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1473.187325] blktrace: Concurrent blktraces are not allowed on sg0 [ 1473.193750] FAULT_INJECTION: forcing a failure. [ 1473.193750] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.194914] CPU: 1 PID: 8433 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1473.195504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1473.196199] Call Trace: [ 1473.196434] dump_stack+0x107/0x167 [ 1473.196748] should_fail.cold+0x5/0xa [ 1473.197079] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1473.197519] should_failslab+0x5/0x20 [ 1473.197854] kmem_cache_alloc_trace+0x55/0x320 [ 1473.198247] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1473.198683] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1473.199116] __list_lru_init+0x44d/0x890 [ 1473.199472] alloc_super+0x8b8/0xa90 [ 1473.199799] ? fput+0x20/0x20 [ 1473.200068] sget_fc+0x110/0x860 [ 1473.200360] ? set_anon_super+0xc0/0xc0 [ 1473.200703] ? rpc_kill_sb+0x1b0/0x1b0 [ 1473.201036] get_tree_keyed+0x55/0x210 [ 1473.201375] vfs_get_tree+0x8e/0x300 [ 1473.201698] path_mount+0x1429/0x2120 [ 1473.202031] ? strncpy_from_user+0x9e/0x470 [ 1473.202401] ? finish_automount+0xa90/0xa90 [ 1473.202771] ? getname_flags.part.0+0x1dd/0x4f0 [ 1473.203196] __x64_sys_mount+0x282/0x300 [ 1473.203572] ? copy_mnt_ns+0xa00/0xa00 [ 1473.203943] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1473.204435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1473.204913] do_syscall_64+0x33/0x40 [ 1473.205262] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1473.205733] RIP: 0033:0x7fe8bba05b19 [ 1473.206077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1473.207735] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1473.208412] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1473.209041] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1473.209677] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.210324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1473.210971] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:15:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1473.231814] FAULT_INJECTION: forcing a failure. [ 1473.231814] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.232948] CPU: 1 PID: 8438 Comm: syz-executor.0 Not tainted 5.10.224 #1 02:15:35 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 34) [ 1473.233526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1473.235305] Call Trace: [ 1473.235759] dump_stack+0x107/0x167 [ 1473.236374] should_fail.cold+0x5/0xa [ 1473.237021] ? create_object.isra.0+0x3a/0xa20 [ 1473.237794] should_failslab+0x5/0x20 [ 1473.238442] kmem_cache_alloc+0x5b/0x310 [ 1473.239079] ? mark_held_locks+0x9e/0xe0 [ 1473.239431] create_object.isra.0+0x3a/0xa20 [ 1473.239808] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1473.240249] kmem_cache_alloc_trace+0x151/0x320 [ 1473.240661] __uprobe_register+0x19c/0x880 [ 1473.241045] probe_event_enable+0x368/0xa20 [ 1473.241419] ? uprobe_perf_close+0x5f0/0x5f0 [ 1473.241806] trace_uprobe_register+0x54/0x730 [ 1473.242203] perf_trace_event_init+0x554/0x9c0 [ 1473.242599] perf_uprobe_init+0x173/0x210 02:15:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1473.242965] perf_uprobe_event_init+0xff/0x1d0 [ 1473.243369] perf_try_init_event+0x130/0x570 [ 1473.243745] perf_event_alloc.part.0+0xd96/0x2b70 [ 1473.244164] __do_sys_perf_event_open+0x579/0x2e60 [ 1473.244589] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1473.245000] ? perf_event_set_output+0x5b0/0x5b0 [ 1473.245402] ? wait_for_completion_io+0x270/0x270 [ 1473.245828] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1473.246277] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1473.246900] do_syscall_64+0x33/0x40 [ 1473.247508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1473.248397] RIP: 0033:0x7f229d85eb19 [ 1473.249044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1473.252585] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1473.253914] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1473.255079] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1473.255681] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.256281] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1473.256886] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1473.336611] FAULT_INJECTION: forcing a failure. [ 1473.336611] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.337718] CPU: 1 PID: 8448 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1473.338328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1473.339064] Call Trace: [ 1473.339313] dump_stack+0x107/0x167 [ 1473.339626] should_fail.cold+0x5/0xa [ 1473.339955] ? create_object.isra.0+0x3a/0xa20 [ 1473.340354] should_failslab+0x5/0x20 [ 1473.340685] kmem_cache_alloc+0x5b/0x310 [ 1473.341037] ? mark_held_locks+0x9e/0xe0 [ 1473.341389] create_object.isra.0+0x3a/0xa20 [ 1473.341774] kmemleak_alloc_percpu+0xa0/0x100 [ 1473.342161] pcpu_alloc+0x4e2/0x1240 [ 1473.342500] probe_event_enable+0x537/0xa20 [ 1473.342874] ? uprobe_perf_close+0x5f0/0x5f0 [ 1473.343267] ? pcpu_alloc+0x12a/0x1240 [ 1473.343609] trace_uprobe_register+0x54/0x730 [ 1473.344003] perf_trace_event_init+0x554/0x9c0 [ 1473.344402] perf_uprobe_init+0x173/0x210 [ 1473.344764] perf_uprobe_event_init+0xff/0x1d0 [ 1473.345152] perf_try_init_event+0x130/0x570 [ 1473.345531] perf_event_alloc.part.0+0xd96/0x2b70 [ 1473.345951] __do_sys_perf_event_open+0x579/0x2e60 [ 1473.346379] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1473.346792] ? perf_event_set_output+0x5b0/0x5b0 [ 1473.347209] ? wait_for_completion_io+0x270/0x270 [ 1473.347644] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1473.348093] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1473.348535] do_syscall_64+0x33/0x40 [ 1473.348854] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1473.349288] RIP: 0033:0x7f08909a9b19 [ 1473.349607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1473.351170] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1473.351815] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1473.352416] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1473.353017] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.353620] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1473.354233] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1486.308502] FAULT_INJECTION: forcing a failure. [ 1486.308502] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.311122] CPU: 1 PID: 8464 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1486.312621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.314424] Call Trace: [ 1486.314999] dump_stack+0x107/0x167 [ 1486.315787] should_fail.cold+0x5/0xa [ 1486.316619] ? create_object.isra.0+0x3a/0xa20 [ 1486.317593] should_failslab+0x5/0x20 [ 1486.318420] kmem_cache_alloc+0x5b/0x310 [ 1486.319295] ? mark_held_locks+0x9e/0xe0 [ 1486.320058] create_object.isra.0+0x3a/0xa20 [ 1486.321010] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1486.322115] kmem_cache_alloc_trace+0x151/0x320 [ 1486.323150] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1486.324219] __list_lru_init+0x44d/0x890 [ 1486.325103] alloc_super+0x8b8/0xa90 [ 1486.325908] ? fput+0x20/0x20 [ 1486.326578] sget_fc+0x110/0x860 [ 1486.331333] ? set_anon_super+0xc0/0xc0 [ 1486.332195] ? rpc_kill_sb+0x1b0/0x1b0 [ 1486.333024] get_tree_keyed+0x55/0x210 [ 1486.333868] vfs_get_tree+0x8e/0x300 [ 1486.334664] path_mount+0x1429/0x2120 [ 1486.335502] ? strncpy_from_user+0x9e/0x470 [ 1486.336422] ? finish_automount+0xa90/0xa90 [ 1486.337353] ? getname_flags.part.0+0x1dd/0x4f0 [ 1486.338351] __x64_sys_mount+0x282/0x300 [ 1486.339237] ? copy_mnt_ns+0xa00/0xa00 [ 1486.340074] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1486.341203] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1486.342316] do_syscall_64+0x33/0x40 [ 1486.343139] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.344252] RIP: 0033:0x7fe8bba05b19 [ 1486.345057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.349066] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1486.350705] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1486.352248] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1486.353812] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.355367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1486.357018] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1486.367465] FAULT_INJECTION: forcing a failure. [ 1486.367465] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.369963] CPU: 0 PID: 8461 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1486.371450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.373264] Call Trace: [ 1486.373828] dump_stack+0x107/0x167 [ 1486.374628] should_fail.cold+0x5/0xa [ 1486.375466] ? register_for_each_vma+0x476/0xc00 [ 1486.376513] should_failslab+0x5/0x20 02:15:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5382, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x541b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:48 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 35) 02:15:48 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 39) 02:15:48 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 50) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:15:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1486.377344] kmem_cache_alloc_trace+0x55/0x320 [ 1486.383433] register_for_each_vma+0x476/0xc00 [ 1486.384432] __uprobe_register+0x4df/0x880 [ 1486.384861] probe_event_enable+0x368/0xa20 [ 1486.385802] ? uprobe_perf_close+0x5f0/0x5f0 [ 1486.386752] trace_uprobe_register+0x54/0x730 [ 1486.387727] perf_trace_event_init+0x554/0x9c0 [ 1486.388716] perf_uprobe_init+0x173/0x210 [ 1486.389603] perf_uprobe_event_init+0xff/0x1d0 [ 1486.390582] perf_try_init_event+0x130/0x570 [ 1486.391603] perf_event_alloc.part.0+0xd96/0x2b70 [ 1486.392675] __do_sys_perf_event_open+0x579/0x2e60 [ 1486.393746] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1486.394797] ? perf_event_set_output+0x5b0/0x5b0 [ 1486.395840] ? wait_for_completion_io+0x270/0x270 [ 1486.396909] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1486.398044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1486.399187] do_syscall_64+0x33/0x40 [ 1486.399990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.401107] RIP: 0033:0x7f229d85eb19 [ 1486.401909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.405948] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1486.407601] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1486.409154] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1486.410701] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.412266] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1486.413813] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1486.416372] blktrace: Concurrent blktraces are not allowed on sg0 02:15:48 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:15:48 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d3000000800", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1486.464465] FAULT_INJECTION: forcing a failure. [ 1486.464465] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.465219] FAULT_INJECTION: forcing a failure. [ 1486.465219] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.466330] CPU: 1 PID: 8465 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1486.469492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.470376] Call Trace: [ 1486.470675] dump_stack+0x107/0x167 [ 1486.471076] should_fail.cold+0x5/0xa [ 1486.471517] ? register_for_each_vma+0x476/0xc00 [ 1486.472044] should_failslab+0x5/0x20 [ 1486.472470] kmem_cache_alloc_trace+0x55/0x320 [ 1486.472980] register_for_each_vma+0x476/0xc00 [ 1486.473494] __uprobe_register+0x4df/0x880 [ 1486.473980] probe_event_enable+0x368/0xa20 [ 1486.474459] ? uprobe_perf_close+0x5f0/0x5f0 [ 1486.474948] trace_uprobe_register+0x54/0x730 [ 1486.475446] perf_trace_event_init+0x554/0x9c0 [ 1486.475955] perf_uprobe_init+0x173/0x210 [ 1486.476418] perf_uprobe_event_init+0xff/0x1d0 [ 1486.476928] perf_try_init_event+0x130/0x570 [ 1486.477405] perf_event_alloc.part.0+0xd96/0x2b70 [ 1486.477941] __do_sys_perf_event_open+0x579/0x2e60 [ 1486.478486] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1486.479015] ? perf_event_set_output+0x5b0/0x5b0 [ 1486.479530] ? wait_for_completion_io+0x270/0x270 [ 1486.480081] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1486.480651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1486.481218] do_syscall_64+0x33/0x40 [ 1486.481630] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.482178] RIP: 0033:0x7f08909a9b19 [ 1486.482592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.484551] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1486.485381] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1486.486163] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1486.486926] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.487704] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1486.488466] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1486.489095] CPU: 0 PID: 8479 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1486.489674] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.490364] Call Trace: [ 1486.490590] dump_stack+0x107/0x167 [ 1486.490900] should_fail.cold+0x5/0xa [ 1486.491231] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1486.491660] should_failslab+0x5/0x20 [ 1486.491981] kmem_cache_alloc_trace+0x55/0x320 [ 1486.492368] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1486.492796] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1486.493213] __list_lru_init+0x44d/0x890 [ 1486.493559] alloc_super+0x8b8/0xa90 [ 1486.493876] ? fput+0x20/0x20 [ 1486.494140] sget_fc+0x110/0x860 [ 1486.494427] ? set_anon_super+0xc0/0xc0 [ 1486.494764] ? rpc_kill_sb+0x1b0/0x1b0 [ 1486.495097] get_tree_keyed+0x55/0x210 [ 1486.495428] vfs_get_tree+0x8e/0x300 [ 1486.495743] path_mount+0x1429/0x2120 [ 1486.496070] ? strncpy_from_user+0x9e/0x470 [ 1486.496433] ? finish_automount+0xa90/0xa90 [ 1486.496798] ? getname_flags.part.0+0x1dd/0x4f0 [ 1486.497903] __x64_sys_mount+0x282/0x300 [ 1486.498793] ? copy_mnt_ns+0xa00/0xa00 [ 1486.499655] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1486.500802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1486.501925] do_syscall_64+0x33/0x40 [ 1486.502739] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.503858] RIP: 0033:0x7fe8bba05b19 [ 1486.504675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.508731] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1486.510393] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1486.511958] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1486.513520] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.515075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1486.516657] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:15:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5385, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:15:48 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 51) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:15:48 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:15:48 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:15:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5421, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1486.570161] blktrace: Concurrent blktraces are not allowed on sg0 02:16:03 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 52) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:16:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d3000000800", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:16:03 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 40) 02:16:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:16:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5386, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:16:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:03 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 36) 02:16:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5450, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1500.987228] FAULT_INJECTION: forcing a failure. [ 1500.987228] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.990184] CPU: 0 PID: 8496 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1500.992146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1500.992213] FAULT_INJECTION: forcing a failure. [ 1500.992213] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1500.994086] Call Trace: [ 1500.994107] dump_stack+0x107/0x167 [ 1500.994120] should_fail.cold+0x5/0xa [ 1500.994137] ? create_object.isra.0+0x3a/0xa20 [ 1500.994154] should_failslab+0x5/0x20 [ 1500.994175] kmem_cache_alloc+0x5b/0x310 [ 1501.000488] ? mark_held_locks+0x9e/0xe0 [ 1501.001438] create_object.isra.0+0x3a/0xa20 [ 1501.002461] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1501.003659] kmem_cache_alloc_trace+0x151/0x320 [ 1501.004739] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1501.005866] __list_lru_init+0x44d/0x890 [ 1501.006809] alloc_super+0x8b8/0xa90 [ 1501.007703] ? fput+0x20/0x20 [ 1501.008455] sget_fc+0x110/0x860 [ 1501.009188] ? set_anon_super+0xc0/0xc0 [ 1501.010119] ? rpc_kill_sb+0x1b0/0x1b0 [ 1501.011023] get_tree_keyed+0x55/0x210 [ 1501.011962] vfs_get_tree+0x8e/0x300 [ 1501.012828] path_mount+0x1429/0x2120 [ 1501.013721] ? strncpy_from_user+0x9e/0x470 [ 1501.014719] ? finish_automount+0xa90/0xa90 [ 1501.015752] ? getname_flags.part.0+0x1dd/0x4f0 [ 1501.016828] __x64_sys_mount+0x282/0x300 [ 1501.017751] ? copy_mnt_ns+0xa00/0xa00 [ 1501.018672] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1501.019920] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1501.021099] do_syscall_64+0x33/0x40 [ 1501.021963] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1501.023155] RIP: 0033:0x7fe8bba05b19 [ 1501.024018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1501.028310] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1501.030060] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1501.031738] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1501.033389] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1501.035035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1501.036711] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1501.038429] CPU: 1 PID: 8504 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1501.039103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1501.040850] Call Trace: [ 1501.041432] dump_stack+0x107/0x167 [ 1501.042246] should_fail.cold+0x5/0xa [ 1501.043096] __alloc_pages_nodemask+0x182/0x600 [ 1501.044138] ? kmemleak_alloc_percpu+0xaf/0x100 [ 1501.045200] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1501.046578] ? lockdep_init_map_type+0x2c7/0x780 [ 1501.047056] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1501.048267] ? __raw_spin_lock_init+0x36/0x110 [ 1501.048726] probe_event_enable+0x5b1/0xa20 [ 1501.049707] ? uprobe_perf_close+0x5f0/0x5f0 [ 1501.050180] trace_uprobe_register+0x54/0x730 [ 1501.051213] perf_trace_event_init+0x554/0x9c0 [ 1501.051688] perf_uprobe_init+0x173/0x210 [ 1501.052612] perf_uprobe_event_init+0xff/0x1d0 [ 1501.053065] perf_try_init_event+0x130/0x570 [ 1501.054034] perf_event_alloc.part.0+0xd96/0x2b70 [ 1501.054517] __do_sys_perf_event_open+0x579/0x2e60 [ 1501.055621] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1501.056101] ? perf_event_set_output+0x5b0/0x5b0 [ 1501.057192] ? wait_for_completion_io+0x270/0x270 [ 1501.057708] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1501.058893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1501.059407] do_syscall_64+0x33/0x40 [ 1501.060244] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1501.060747] RIP: 0033:0x7f08909a9b19 [ 1501.061578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1501.065684] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1501.066452] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1501.067092] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1501.067759] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1501.068457] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1501.069171] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:16:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:16:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x541b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1501.105794] FAULT_INJECTION: forcing a failure. [ 1501.105794] name failslab, interval 1, probability 0, space 0, times 0 [ 1501.107895] CPU: 1 PID: 8507 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1501.109441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1501.111293] Call Trace: [ 1501.111889] dump_stack+0x107/0x167 [ 1501.112704] should_fail.cold+0x5/0xa [ 1501.113557] ? create_object.isra.0+0x3a/0xa20 [ 1501.114583] should_failslab+0x5/0x20 [ 1501.115447] kmem_cache_alloc+0x5b/0x310 [ 1501.116360] create_object.isra.0+0x3a/0xa20 [ 1501.117358] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1501.118518] kmem_cache_alloc_trace+0x151/0x320 [ 1501.119610] register_for_each_vma+0x476/0xc00 [ 1501.120670] __uprobe_register+0x4df/0x880 [ 1501.121658] probe_event_enable+0x368/0xa20 [ 1501.122642] ? uprobe_perf_close+0x5f0/0x5f0 [ 1501.123662] trace_uprobe_register+0x54/0x730 [ 1501.124695] perf_trace_event_init+0x554/0x9c0 [ 1501.125738] perf_uprobe_init+0x173/0x210 [ 1501.126691] perf_uprobe_event_init+0xff/0x1d0 [ 1501.127762] perf_try_init_event+0x130/0x570 [ 1501.128765] perf_event_alloc.part.0+0xd96/0x2b70 [ 1501.129874] __do_sys_perf_event_open+0x579/0x2e60 [ 1501.131002] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1501.132111] ? perf_event_set_output+0x5b0/0x5b0 [ 1501.133183] ? wait_for_completion_io+0x270/0x270 [ 1501.134305] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1501.135511] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1501.136677] do_syscall_64+0x33/0x40 [ 1501.137522] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1501.138684] RIP: 0033:0x7f229d85eb19 [ 1501.139540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1501.143722] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1501.145444] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1501.147059] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1501.148682] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1501.150296] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1501.151896] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1501.192664] blktrace: Concurrent blktraces are not allowed on sg0 02:16:03 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 37) 02:16:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5451, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:16:03 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 53) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1501.305111] FAULT_INJECTION: forcing a failure. [ 1501.305111] name failslab, interval 1, probability 0, space 0, times 0 [ 1501.307904] CPU: 1 PID: 8528 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1501.309437] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1501.311297] Call Trace: [ 1501.311895] dump_stack+0x107/0x167 [ 1501.312702] should_fail.cold+0x5/0xa [ 1501.313567] ? __uprobe_register+0x19c/0x880 [ 1501.314559] should_failslab+0x5/0x20 [ 1501.315425] kmem_cache_alloc_trace+0x55/0x320 [ 1501.316449] __uprobe_register+0x19c/0x880 [ 1501.317416] probe_event_enable+0x368/0xa20 [ 1501.318387] ? uprobe_perf_close+0x5f0/0x5f0 [ 1501.319405] trace_uprobe_register+0x54/0x730 [ 1501.320416] perf_trace_event_init+0x554/0x9c0 [ 1501.321443] perf_uprobe_init+0x173/0x210 [ 1501.322380] perf_uprobe_event_init+0xff/0x1d0 [ 1501.323405] perf_try_init_event+0x130/0x570 [ 1501.324387] perf_event_alloc.part.0+0xd96/0x2b70 [ 1501.325470] __do_sys_perf_event_open+0x579/0x2e60 02:16:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5421, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:16:03 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 41) [ 1501.326937] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1501.326955] ? perf_event_set_output+0x5b0/0x5b0 [ 1501.326970] ? wait_for_completion_io+0x270/0x270 [ 1501.327015] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1501.327030] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1501.327048] do_syscall_64+0x33/0x40 [ 1501.327064] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1501.327074] RIP: 0033:0x7f08909a9b19 02:16:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1501.327091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1501.327100] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1501.327117] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1501.327126] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1501.327135] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1501.327144] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1501.327153] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1501.372148] blktrace: Concurrent blktraces are not allowed on sg0 [ 1501.384111] FAULT_INJECTION: forcing a failure. [ 1501.384111] name failslab, interval 1, probability 0, space 0, times 0 [ 1501.386735] CPU: 1 PID: 8540 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1501.388268] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1501.390107] Call Trace: [ 1501.390698] dump_stack+0x107/0x167 [ 1501.391525] should_fail.cold+0x5/0xa [ 1501.392381] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1501.393517] should_failslab+0x5/0x20 [ 1501.394372] kmem_cache_alloc_trace+0x55/0x320 [ 1501.395402] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1501.396540] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1501.397637] __list_lru_init+0x44d/0x890 [ 1501.398553] alloc_super+0x8b8/0xa90 [ 1501.399399] ? fput+0x20/0x20 [ 1501.400097] sget_fc+0x110/0x860 [ 1501.400853] ? set_anon_super+0xc0/0xc0 [ 1501.401734] ? rpc_kill_sb+0x1b0/0x1b0 [ 1501.402601] get_tree_keyed+0x55/0x210 [ 1501.403480] vfs_get_tree+0x8e/0x300 [ 1501.404308] path_mount+0x1429/0x2120 [ 1501.405171] ? strncpy_from_user+0x9e/0x470 [ 1501.406128] ? finish_automount+0xa90/0xa90 [ 1501.407087] ? getname_flags.part.0+0x1dd/0x4f0 [ 1501.408141] __x64_sys_mount+0x282/0x300 [ 1501.409044] ? copy_mnt_ns+0xa00/0xa00 [ 1501.409922] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1501.411091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1501.412251] do_syscall_64+0x33/0x40 [ 1501.413084] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1501.414219] RIP: 0033:0x7fe8bba05b19 [ 1501.415047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1501.419154] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1501.420861] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1501.422442] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1501.424030] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1501.425608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1501.427185] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:16:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5450, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1501.493152] FAULT_INJECTION: forcing a failure. [ 1501.493152] name failslab, interval 1, probability 0, space 0, times 0 [ 1501.494476] CPU: 0 PID: 8539 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1501.495124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1501.495941] Call Trace: [ 1501.496215] dump_stack+0x107/0x167 [ 1501.496598] should_fail.cold+0x5/0xa [ 1501.496960] ? register_for_each_vma+0x476/0xc00 [ 1501.497519] should_failslab+0x5/0x20 [ 1501.497876] kmem_cache_alloc_trace+0x55/0x320 [ 1501.498401] register_for_each_vma+0x476/0xc00 [ 1501.498832] __uprobe_register+0x4df/0x880 [ 1501.499393] probe_event_enable+0x368/0xa20 [ 1501.499804] ? uprobe_perf_close+0x5f0/0x5f0 [ 1501.500217] trace_uprobe_register+0x54/0x730 [ 1501.500701] perf_trace_event_init+0x554/0x9c0 [ 1501.501133] perf_uprobe_init+0x173/0x210 [ 1501.501588] perf_uprobe_event_init+0xff/0x1d0 [ 1501.502008] perf_try_init_event+0x130/0x570 [ 1501.502508] perf_event_alloc.part.0+0xd96/0x2b70 [ 1501.502957] __do_sys_perf_event_open+0x579/0x2e60 [ 1501.503485] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1501.503931] ? perf_event_set_output+0x5b0/0x5b0 [ 1501.504408] ? wait_for_completion_io+0x270/0x270 [ 1501.504894] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1501.505420] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1501.505914] do_syscall_64+0x33/0x40 [ 1501.506320] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1501.506809] RIP: 0033:0x7f229d85eb19 [ 1501.507151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1501.508939] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1501.509681] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1501.510420] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1501.511094] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1501.511770] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1501.512426] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:16:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:16:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r1 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5452, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1501.568010] blktrace: Concurrent blktraces are not allowed on sg0 02:16:17 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 38) 02:16:17 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5460, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1515.255720] FAULT_INJECTION: forcing a failure. [ 1515.255720] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.256707] CPU: 0 PID: 8566 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1515.257250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.257906] Call Trace: [ 1515.258132] dump_stack+0x107/0x167 [ 1515.258428] should_fail.cold+0x5/0xa [ 1515.258743] ? create_object.isra.0+0x3a/0xa20 [ 1515.259121] should_failslab+0x5/0x20 [ 1515.259459] kmem_cache_alloc+0x5b/0x310 [ 1515.259794] ? mark_held_locks+0x9e/0xe0 [ 1515.260126] create_object.isra.0+0x3a/0xa20 [ 1515.260483] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1515.260894] kmem_cache_alloc_trace+0x151/0x320 [ 1515.261277] __uprobe_register+0x19c/0x880 [ 1515.261636] probe_event_enable+0x368/0xa20 [ 1515.261987] ? uprobe_perf_close+0x5f0/0x5f0 [ 1515.262351] trace_uprobe_register+0x54/0x730 [ 1515.262724] perf_trace_event_init+0x554/0x9c0 [ 1515.263103] perf_uprobe_init+0x173/0x210 [ 1515.263461] perf_uprobe_event_init+0xff/0x1d0 [ 1515.263844] perf_try_init_event+0x130/0x570 [ 1515.264202] perf_event_alloc.part.0+0xd96/0x2b70 [ 1515.264596] __do_sys_perf_event_open+0x579/0x2e60 [ 1515.265001] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1515.265391] ? perf_event_set_output+0x5b0/0x5b0 [ 1515.265774] ? wait_for_completion_io+0x270/0x270 [ 1515.266180] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.266602] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.267019] do_syscall_64+0x33/0x40 [ 1515.267330] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.267821] RIP: 0033:0x7f08909a9b19 [ 1515.268126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.269573] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1515.270176] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1515.270739] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 02:16:17 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 54) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:16:17 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:16:17 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5451, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:16:17 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 42) 02:16:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1515.271303] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.275887] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1515.276447] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1515.282517] FAULT_INJECTION: forcing a failure. [ 1515.282517] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.283527] CPU: 1 PID: 8571 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1515.284100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.284792] Call Trace: [ 1515.285019] dump_stack+0x107/0x167 [ 1515.285329] should_fail.cold+0x5/0xa [ 1515.285653] ? create_object.isra.0+0x3a/0xa20 [ 1515.286044] should_failslab+0x5/0x20 [ 1515.286370] kmem_cache_alloc+0x5b/0x310 [ 1515.286716] ? mark_held_locks+0x9e/0xe0 [ 1515.287064] create_object.isra.0+0x3a/0xa20 [ 1515.287459] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1515.287893] kmem_cache_alloc_trace+0x151/0x320 [ 1515.288294] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1515.288712] __list_lru_init+0x44d/0x890 [ 1515.289064] alloc_super+0x8b8/0xa90 [ 1515.289385] ? fput+0x20/0x20 [ 1515.289653] sget_fc+0x110/0x860 [ 1515.289943] ? set_anon_super+0xc0/0xc0 [ 1515.290285] ? rpc_kill_sb+0x1b0/0x1b0 [ 1515.290617] get_tree_keyed+0x55/0x210 [ 1515.290950] vfs_get_tree+0x8e/0x300 [ 1515.291269] path_mount+0x1429/0x2120 [ 1515.291614] ? strncpy_from_user+0x9e/0x470 [ 1515.291983] ? finish_automount+0xa90/0xa90 [ 1515.292353] ? getname_flags.part.0+0x1dd/0x4f0 [ 1515.292757] __x64_sys_mount+0x282/0x300 [ 1515.293104] ? copy_mnt_ns+0xa00/0xa00 [ 1515.293441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.293889] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.294328] do_syscall_64+0x33/0x40 [ 1515.294648] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.295083] RIP: 0033:0x7fe8bba05b19 [ 1515.295410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.296961] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1515.297606] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1515.298206] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1515.298808] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.299426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.300028] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1515.312747] FAULT_INJECTION: forcing a failure. [ 1515.312747] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.313754] CPU: 1 PID: 8575 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1515.314330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.315024] Call Trace: [ 1515.315258] dump_stack+0x107/0x167 [ 1515.315593] should_fail.cold+0x5/0xa [ 1515.315921] ? create_object.isra.0+0x3a/0xa20 [ 1515.316315] should_failslab+0x5/0x20 [ 1515.316641] kmem_cache_alloc+0x5b/0x310 [ 1515.316990] ? mark_held_locks+0x9e/0xe0 [ 1515.317340] create_object.isra.0+0x3a/0xa20 [ 1515.317718] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1515.318157] kmem_cache_alloc_trace+0x151/0x320 [ 1515.318565] register_for_each_vma+0x476/0xc00 [ 1515.318968] __uprobe_register+0x4df/0x880 [ 1515.319355] probe_event_enable+0x368/0xa20 [ 1515.319731] ? uprobe_perf_close+0x5f0/0x5f0 [ 1515.320118] trace_uprobe_register+0x54/0x730 [ 1515.320514] perf_trace_event_init+0x554/0x9c0 [ 1515.320914] perf_uprobe_init+0x173/0x210 [ 1515.321279] perf_uprobe_event_init+0xff/0x1d0 [ 1515.321669] perf_try_init_event+0x130/0x570 [ 1515.322048] perf_event_alloc.part.0+0xd96/0x2b70 [ 1515.322474] __do_sys_perf_event_open+0x579/0x2e60 [ 1515.322901] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1515.323322] ? perf_event_set_output+0x5b0/0x5b0 [ 1515.323735] ? wait_for_completion_io+0x270/0x270 [ 1515.324164] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.324609] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.325050] do_syscall_64+0x33/0x40 [ 1515.325369] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.325802] RIP: 0033:0x7f229d85eb19 [ 1515.326120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.327679] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1515.328328] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1515.328928] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1515.329526] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.330127] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1515.330727] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:16:30 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 43) 02:16:30 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 39) 02:16:30 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:16:30 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 55) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:16:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:16:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5452, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1528.096911] FAULT_INJECTION: forcing a failure. [ 1528.096911] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.098596] CPU: 1 PID: 8595 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1528.100100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.102089] Call Trace: [ 1528.102734] dump_stack+0x107/0x167 [ 1528.103601] should_fail.cold+0x5/0xa [ 1528.104518] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1528.105739] should_failslab+0x5/0x20 [ 1528.106655] kmem_cache_alloc_trace+0x55/0x320 [ 1528.107763] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1528.108995] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1528.110166] __list_lru_init+0x44d/0x890 [ 1528.111137] alloc_super+0x8b8/0xa90 [ 1528.112045] ? fput+0x20/0x20 [ 1528.112795] sget_fc+0x110/0x860 [ 1528.113600] ? set_anon_super+0xc0/0xc0 [ 1528.114547] ? rpc_kill_sb+0x1b0/0x1b0 [ 1528.115484] get_tree_keyed+0x55/0x210 [ 1528.116415] vfs_get_tree+0x8e/0x300 [ 1528.117306] path_mount+0x1429/0x2120 [ 1528.118222] ? strncpy_from_user+0x9e/0x470 [ 1528.119242] ? finish_automount+0xa90/0xa90 [ 1528.120293] ? getname_flags.part.0+0x1dd/0x4f0 [ 1528.121423] __x64_sys_mount+0x282/0x300 [ 1528.122389] ? copy_mnt_ns+0xa00/0xa00 [ 1528.123329] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.124590] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.125836] do_syscall_64+0x33/0x40 [ 1528.126723] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.127957] RIP: 0033:0x7fe8bba05b19 [ 1528.128844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.133295] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1528.135124] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1528.136853] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1528.138565] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.140304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.141990] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:16:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x40049409, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:30 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 56) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1528.171471] FAULT_INJECTION: forcing a failure. [ 1528.171471] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.173101] CPU: 0 PID: 8601 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1528.174121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.175149] Call Trace: [ 1528.175494] dump_stack+0x107/0x167 [ 1528.175929] should_fail.cold+0x5/0xa [ 1528.176462] ? register_for_each_vma+0x476/0xc00 [ 1528.177014] should_failslab+0x5/0x20 [ 1528.177512] kmem_cache_alloc_trace+0x55/0x320 [ 1528.178083] register_for_each_vma+0x476/0xc00 [ 1528.178663] __uprobe_register+0x4df/0x880 [ 1528.179305] probe_event_enable+0x368/0xa20 [ 1528.179827] ? uprobe_perf_close+0x5f0/0x5f0 [ 1528.180391] trace_uprobe_register+0x54/0x730 [ 1528.180926] perf_trace_event_init+0x554/0x9c0 [ 1528.181464] perf_uprobe_init+0x173/0x210 [ 1528.181951] perf_uprobe_event_init+0xff/0x1d0 [ 1528.182511] perf_try_init_event+0x130/0x570 [ 1528.183048] perf_event_alloc.part.0+0xd96/0x2b70 [ 1528.183628] __do_sys_perf_event_open+0x579/0x2e60 [ 1528.184193] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1528.184811] ? perf_event_set_output+0x5b0/0x5b0 [ 1528.185350] ? wait_for_completion_io+0x270/0x270 [ 1528.185916] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.186532] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.187153] do_syscall_64+0x33/0x40 [ 1528.187609] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.188186] RIP: 0033:0x7f08909a9b19 [ 1528.188637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.190666] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1528.191575] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1528.194371] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1528.195171] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.196002] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1528.196810] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:16:30 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x5460, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1528.249328] FAULT_INJECTION: forcing a failure. [ 1528.249328] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.264895] CPU: 0 PID: 8591 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1528.266493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.268505] Call Trace: [ 1528.269164] dump_stack+0x107/0x167 [ 1528.270061] should_fail.cold+0x5/0xa [ 1528.270984] ? register_for_each_vma+0x476/0xc00 [ 1528.272158] should_failslab+0x5/0x20 [ 1528.273094] kmem_cache_alloc_trace+0x55/0x320 [ 1528.274213] register_for_each_vma+0x476/0xc00 [ 1528.275348] __uprobe_register+0x4df/0x880 [ 1528.276415] probe_event_enable+0x368/0xa20 [ 1528.277467] ? uprobe_perf_close+0x5f0/0x5f0 [ 1528.278534] trace_uprobe_register+0x54/0x730 [ 1528.279654] perf_trace_event_init+0x554/0x9c0 [ 1528.280771] perf_uprobe_init+0x173/0x210 [ 1528.281796] perf_uprobe_event_init+0xff/0x1d0 [ 1528.282902] perf_try_init_event+0x130/0x570 [ 1528.283986] perf_event_alloc.part.0+0xd96/0x2b70 [ 1528.285163] __do_sys_perf_event_open+0x579/0x2e60 [ 1528.286371] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1528.287544] ? perf_event_set_output+0x5b0/0x5b0 [ 1528.288689] ? wait_for_completion_io+0x270/0x270 [ 1528.289889] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.291162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.292422] do_syscall_64+0x33/0x40 [ 1528.293327] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.294571] RIP: 0033:0x7f229d85eb19 [ 1528.295508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.300010] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1528.301752] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1528.303396] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1528.305168] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.306916] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1528.308664] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:16:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1528.335778] FAULT_INJECTION: forcing a failure. 02:16:30 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1528.335778] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.338975] CPU: 0 PID: 8609 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1528.340809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1528.342985] Call Trace: 02:16:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1528.343703] dump_stack+0x107/0x167 [ 1528.344837] should_fail.cold+0x5/0xa [ 1528.345837] ? create_object.isra.0+0x3a/0xa20 [ 1528.347033] should_failslab+0x5/0x20 [ 1528.348072] kmem_cache_alloc+0x5b/0x310 [ 1528.349138] ? mark_held_locks+0x9e/0xe0 [ 1528.350204] create_object.isra.0+0x3a/0xa20 [ 1528.351335] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1528.352667] kmem_cache_alloc_trace+0x151/0x320 [ 1528.353884] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1528.355166] __list_lru_init+0x44d/0x890 [ 1528.356243] alloc_super+0x8b8/0xa90 [ 1528.357207] ? fput+0x20/0x20 [ 1528.358005] sget_fc+0x110/0x860 [ 1528.358882] ? set_anon_super+0xc0/0xc0 [ 1528.359917] ? rpc_kill_sb+0x1b0/0x1b0 [ 1528.360920] get_tree_keyed+0x55/0x210 [ 1528.361921] vfs_get_tree+0x8e/0x300 [ 1528.362878] path_mount+0x1429/0x2120 [ 1528.363871] ? strncpy_from_user+0x9e/0x470 [ 1528.364986] ? finish_automount+0xa90/0xa90 [ 1528.366094] ? getname_flags.part.0+0x1dd/0x4f0 [ 1528.367286] __x64_sys_mount+0x282/0x300 [ 1528.368319] ? copy_mnt_ns+0xa00/0xa00 [ 1528.369316] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1528.370645] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.371984] do_syscall_64+0x33/0x40 [ 1528.372937] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1528.374238] RIP: 0033:0x7fe8bba05b19 [ 1528.375189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.379872] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1528.381795] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1528.383610] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1528.385411] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.387229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.389044] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:16:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x40086602, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1528.442676] blktrace: Concurrent blktraces are not allowed on sg0 02:16:43 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 40) 02:16:43 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:16:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:16:43 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 44) 02:16:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x40049409, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:16:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:44 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 57) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:16:44 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x40087602, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1541.744234] FAULT_INJECTION: forcing a failure. [ 1541.744234] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.745429] CPU: 1 PID: 8642 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1541.746026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1541.746795] Call Trace: [ 1541.747108] dump_stack+0x107/0x167 [ 1541.747453] should_fail.cold+0x5/0xa [ 1541.747796] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1541.748297] should_failslab+0x5/0x20 [ 1541.748625] kmem_cache_alloc_trace+0x55/0x320 [ 1541.749013] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1541.749506] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1541.749923] __list_lru_init+0x44d/0x890 [ 1541.750335] alloc_super+0x8b8/0xa90 [ 1541.750655] ? fput+0x20/0x20 [ 1541.750920] sget_fc+0x110/0x860 [ 1541.751277] ? set_anon_super+0xc0/0xc0 [ 1541.751644] ? rpc_kill_sb+0x1b0/0x1b0 [ 1541.751978] get_tree_keyed+0x55/0x210 [ 1541.752369] vfs_get_tree+0x8e/0x300 [ 1541.752703] path_mount+0x1429/0x2120 [ 1541.753076] ? strncpy_from_user+0x9e/0x470 [ 1541.753452] ? finish_automount+0xa90/0xa90 [ 1541.753830] ? getname_flags.part.0+0x1dd/0x4f0 [ 1541.754282] __x64_sys_mount+0x282/0x300 [ 1541.754642] ? copy_mnt_ns+0xa00/0xa00 [ 1541.754982] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1541.755498] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1541.755965] do_syscall_64+0x33/0x40 [ 1541.756342] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1541.756788] RIP: 0033:0x7fe8bba05b19 [ 1541.757153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1541.758736] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1541.759456] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1541.760137] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1541.760735] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1541.761392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1541.761996] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1541.764200] FAULT_INJECTION: forcing a failure. [ 1541.764200] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.765269] CPU: 0 PID: 8636 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1541.765867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1541.766585] Call Trace: [ 1541.766832] dump_stack+0x107/0x167 [ 1541.767147] should_fail.cold+0x5/0xa [ 1541.767481] ? create_object.isra.0+0x3a/0xa20 [ 1541.767896] should_failslab+0x5/0x20 [ 1541.768226] kmem_cache_alloc+0x5b/0x310 [ 1541.768578] ? mark_held_locks+0x9e/0xe0 [ 1541.768929] create_object.isra.0+0x3a/0xa20 [ 1541.769307] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1541.769746] kmem_cache_alloc_trace+0x151/0x320 [ 1541.770153] register_for_each_vma+0x476/0xc00 [ 1541.770556] __uprobe_register+0x4df/0x880 [ 1541.770938] probe_event_enable+0x368/0xa20 [ 1541.771309] ? uprobe_perf_close+0x5f0/0x5f0 [ 1541.771704] trace_uprobe_register+0x54/0x730 [ 1541.772100] perf_trace_event_init+0x554/0x9c0 [ 1541.772500] perf_uprobe_init+0x173/0x210 [ 1541.772866] perf_uprobe_event_init+0xff/0x1d0 [ 1541.773256] perf_try_init_event+0x130/0x570 [ 1541.773644] perf_event_alloc.part.0+0xd96/0x2b70 [ 1541.774065] __do_sys_perf_event_open+0x579/0x2e60 [ 1541.774497] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1541.774911] ? perf_event_set_output+0x5b0/0x5b0 [ 1541.775319] ? wait_for_completion_io+0x270/0x270 [ 1541.775760] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1541.776211] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1541.776654] do_syscall_64+0x33/0x40 [ 1541.776974] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1541.777410] RIP: 0033:0x7f229d85eb19 [ 1541.777732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1541.779282] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1541.779938] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1541.780541] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1541.781143] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1541.781747] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1541.782362] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:16:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x40086602, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1541.804469] blktrace: Concurrent blktraces are not allowed on sg0 [ 1541.813469] FAULT_INJECTION: forcing a failure. [ 1541.813469] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.814560] CPU: 1 PID: 8641 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1541.815219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1541.815922] Call Trace: [ 1541.816207] dump_stack+0x107/0x167 [ 1541.816531] should_fail.cold+0x5/0xa [ 1541.816859] ? create_object.isra.0+0x3a/0xa20 [ 1541.817310] should_failslab+0x5/0x20 [ 1541.817831] kmem_cache_alloc+0x5b/0x310 [ 1541.818229] ? mark_held_locks+0x9e/0xe0 [ 1541.818593] create_object.isra.0+0x3a/0xa20 [ 1541.818968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1541.819482] kmem_cache_alloc_trace+0x151/0x320 02:16:44 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1541.819940] register_for_each_vma+0x476/0xc00 [ 1541.820405] __uprobe_register+0x4df/0x880 [ 1541.820803] probe_event_enable+0x368/0xa20 [ 1541.821248] ? uprobe_perf_close+0x5f0/0x5f0 [ 1541.821714] trace_uprobe_register+0x54/0x730 [ 1541.822189] perf_trace_event_init+0x554/0x9c0 [ 1541.822590] perf_uprobe_init+0x173/0x210 [ 1541.822965] perf_uprobe_event_init+0xff/0x1d0 [ 1541.823423] perf_try_init_event+0x130/0x570 [ 1541.823828] perf_event_alloc.part.0+0xd96/0x2b70 [ 1541.824340] __do_sys_perf_event_open+0x579/0x2e60 [ 1541.824781] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1541.825958] ? perf_event_set_output+0x5b0/0x5b0 [ 1541.826417] ? wait_for_completion_io+0x270/0x270 [ 1541.826873] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1541.827376] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1541.827852] do_syscall_64+0x33/0x40 [ 1541.828256] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1541.828686] RIP: 0033:0x7f08909a9b19 [ 1541.829017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1541.830636] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1541.831335] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1541.831945] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1541.832624] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1541.833284] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1541.833877] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:16:44 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x40087602, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:16:44 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 58) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:16:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:44 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x4020940d, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:16:44 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1541.983448] blktrace: Concurrent blktraces are not allowed on sg0 [ 1541.996243] FAULT_INJECTION: forcing a failure. [ 1541.996243] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.997469] CPU: 1 PID: 8665 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1541.998114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1541.998842] Call Trace: [ 1541.999141] dump_stack+0x107/0x167 [ 1541.999487] should_fail.cold+0x5/0xa [ 1541.999829] ? create_object.isra.0+0x3a/0xa20 [ 1542.000274] should_failslab+0x5/0x20 [ 1542.000617] kmem_cache_alloc+0x5b/0x310 [ 1542.000966] ? mark_held_locks+0x9e/0xe0 [ 1542.001399] create_object.isra.0+0x3a/0xa20 [ 1542.001774] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1542.002257] kmem_cache_alloc_trace+0x151/0x320 [ 1542.002674] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1542.003141] __list_lru_init+0x44d/0x890 [ 1542.003508] alloc_super+0x8b8/0xa90 [ 1542.003839] ? fput+0x20/0x20 [ 1542.004155] sget_fc+0x110/0x860 [ 1542.004446] ? set_anon_super+0xc0/0xc0 [ 1542.008407] ? rpc_kill_sb+0x1b0/0x1b0 [ 1542.008739] get_tree_keyed+0x55/0x210 [ 1542.009136] vfs_get_tree+0x8e/0x300 [ 1542.009453] path_mount+0x1429/0x2120 [ 1542.009789] ? strncpy_from_user+0x9e/0x470 [ 1542.010217] ? finish_automount+0xa90/0xa90 [ 1542.010583] ? getname_flags.part.0+0x1dd/0x4f0 [ 1542.010998] __x64_sys_mount+0x282/0x300 [ 1542.011409] ? copy_mnt_ns+0xa00/0xa00 [ 1542.011755] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1542.012264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1542.012702] do_syscall_64+0x33/0x40 [ 1542.013024] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1542.013513] RIP: 0033:0x7fe8bba05b19 [ 1542.013827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1542.015490] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1542.016273] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1542.016944] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1542.017679] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.018373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1542.018984] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:16:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1555.545617] FAULT_INJECTION: forcing a failure. [ 1555.545617] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.547498] CPU: 1 PID: 8684 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1555.548289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.549175] Call Trace: [ 1555.549492] dump_stack+0x107/0x167 [ 1555.549896] should_fail.cold+0x5/0xa [ 1555.550364] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1555.550914] should_failslab+0x5/0x20 [ 1555.551351] kmem_cache_alloc_trace+0x55/0x320 [ 1555.551854] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1555.552406] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1555.552936] __list_lru_init+0x44d/0x890 [ 1555.553406] alloc_super+0x8b8/0xa90 [ 1555.553846] ? fput+0x20/0x20 [ 1555.554153] sget_fc+0x110/0x860 [ 1555.554570] ? set_anon_super+0xc0/0xc0 [ 1555.555026] ? rpc_kill_sb+0x1b0/0x1b0 [ 1555.555474] get_tree_keyed+0x55/0x210 [ 1555.555914] vfs_get_tree+0x8e/0x300 [ 1555.556317] path_mount+0x1429/0x2120 [ 1555.556754] ? strncpy_from_user+0x9e/0x470 [ 1555.557184] ? finish_automount+0xa90/0xa90 [ 1555.557659] ? getname_flags.part.0+0x1dd/0x4f0 [ 1555.558157] __x64_sys_mount+0x282/0x300 [ 1555.558634] ? copy_mnt_ns+0xa00/0xa00 [ 1555.559089] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.559675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.560265] do_syscall_64+0x33/0x40 [ 1555.560631] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.561183] RIP: 0033:0x7fe8bba05b19 [ 1555.561587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.563567] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1555.564442] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1555.565192] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1555.566025] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.566849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1555.567805] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:16:57 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 45) 02:16:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:57 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 41) 02:16:57 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 59) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:16:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x80086601, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:16:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x4020940d, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:16:57 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1555.573510] FAULT_INJECTION: forcing a failure. [ 1555.573510] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.576030] CPU: 0 PID: 8679 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1555.577512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.579314] Call Trace: [ 1555.579897] dump_stack+0x107/0x167 [ 1555.580689] should_fail.cold+0x5/0xa [ 1555.581523] ? register_for_each_vma+0x476/0xc00 [ 1555.582835] should_failslab+0x5/0x20 [ 1555.582848] kmem_cache_alloc_trace+0x55/0x320 [ 1555.582866] register_for_each_vma+0x476/0xc00 [ 1555.582892] __uprobe_register+0x4df/0x880 02:16:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x80086601, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1555.582918] probe_event_enable+0x368/0xa20 [ 1555.582931] ? uprobe_perf_close+0x5f0/0x5f0 [ 1555.582950] trace_uprobe_register+0x54/0x730 [ 1555.582970] perf_trace_event_init+0x554/0x9c0 [ 1555.582989] perf_uprobe_init+0x173/0x210 [ 1555.583006] perf_uprobe_event_init+0xff/0x1d0 [ 1555.583018] perf_try_init_event+0x130/0x570 [ 1555.583033] perf_event_alloc.part.0+0xd96/0x2b70 [ 1555.583054] __do_sys_perf_event_open+0x579/0x2e60 [ 1555.583074] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1555.583088] ? perf_event_set_output+0x5b0/0x5b0 [ 1555.583099] ? wait_for_completion_io+0x270/0x270 [ 1555.583129] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.583140] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.583154] do_syscall_64+0x33/0x40 [ 1555.583165] entry_SYSCALL_64_after_hwframe+0x67/0xd1 02:16:57 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1555.583173] RIP: 0033:0x7f229d85eb19 [ 1555.583185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:16:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1555.583191] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1555.583204] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1555.583211] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1555.583218] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.583225] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1555.583232] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:16:57 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 42) [ 1555.588994] blktrace: Concurrent blktraces are not allowed on sg0 [ 1555.604914] FAULT_INJECTION: forcing a failure. [ 1555.604914] name failslab, interval 1, probability 0, space 0, times 0 02:16:57 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x80087601, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1555.604927] CPU: 0 PID: 8683 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1555.604934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 02:16:57 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 60) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1555.604938] Call Trace: [ 1555.604951] dump_stack+0x107/0x167 [ 1555.604965] should_fail.cold+0x5/0xa [ 1555.604979] ? create_object.isra.0+0x3a/0xa20 [ 1555.604992] should_failslab+0x5/0x20 [ 1555.605005] kmem_cache_alloc+0x5b/0x310 [ 1555.605017] ? mark_held_locks+0x9e/0xe0 [ 1555.605032] create_object.isra.0+0x3a/0xa20 [ 1555.605044] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1555.605061] kmem_cache_alloc_trace+0x151/0x320 [ 1555.605082] register_for_each_vma+0x476/0xc00 02:16:57 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 46) [ 1555.605108] __uprobe_register+0x4df/0x880 [ 1555.605133] probe_event_enable+0x368/0xa20 [ 1555.605146] ? uprobe_perf_close+0x5f0/0x5f0 [ 1555.605165] trace_uprobe_register+0x54/0x730 [ 1555.605186] perf_trace_event_init+0x554/0x9c0 [ 1555.605205] perf_uprobe_init+0x173/0x210 [ 1555.605222] perf_uprobe_event_init+0xff/0x1d0 02:16:58 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1555.605234] perf_try_init_event+0x130/0x570 [ 1555.605248] perf_event_alloc.part.0+0xd96/0x2b70 [ 1555.605269] __do_sys_perf_event_open+0x579/0x2e60 02:16:58 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1555.605289] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1555.605302] ? perf_event_set_output+0x5b0/0x5b0 [ 1555.605313] ? wait_for_completion_io+0x270/0x270 [ 1555.605343] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.605354] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.605368] do_syscall_64+0x33/0x40 [ 1555.605380] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.605387] RIP: 0033:0x7f08909a9b19 [ 1555.605399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:16:58 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 61) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1555.605405] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1555.605419] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1555.605426] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1555.605432] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.605439] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1555.605446] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1555.750527] FAULT_INJECTION: forcing a failure. [ 1555.750527] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.750543] CPU: 0 PID: 8709 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1555.750549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.750554] Call Trace: [ 1555.750571] dump_stack+0x107/0x167 [ 1555.750584] should_fail.cold+0x5/0xa [ 1555.750599] ? create_object.isra.0+0x3a/0xa20 [ 1555.750613] should_failslab+0x5/0x20 [ 1555.750626] kmem_cache_alloc+0x5b/0x310 [ 1555.750640] ? mark_held_locks+0x9e/0xe0 [ 1555.750654] create_object.isra.0+0x3a/0xa20 [ 1555.750667] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1555.750684] kmem_cache_alloc_trace+0x151/0x320 [ 1555.750703] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1555.750718] __list_lru_init+0x44d/0x890 [ 1555.750734] alloc_super+0x8b8/0xa90 [ 1555.750746] ? fput+0x20/0x20 [ 1555.750756] sget_fc+0x110/0x860 [ 1555.750767] ? set_anon_super+0xc0/0xc0 [ 1555.750780] ? rpc_kill_sb+0x1b0/0x1b0 [ 1555.750792] get_tree_keyed+0x55/0x210 [ 1555.750804] vfs_get_tree+0x8e/0x300 [ 1555.750816] path_mount+0x1429/0x2120 [ 1555.750835] ? strncpy_from_user+0x9e/0x470 [ 1555.750847] ? finish_automount+0xa90/0xa90 [ 1555.750859] ? getname_flags.part.0+0x1dd/0x4f0 [ 1555.750878] __x64_sys_mount+0x282/0x300 [ 1555.750888] ? copy_mnt_ns+0xa00/0xa00 [ 1555.750904] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.750918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.750931] do_syscall_64+0x33/0x40 [ 1555.750944] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.750952] RIP: 0033:0x7fe8bba05b19 [ 1555.750964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.750971] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1555.750985] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1555.750992] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1555.750999] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.751006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1555.751014] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1555.806104] FAULT_INJECTION: forcing a failure. [ 1555.806104] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.806119] CPU: 1 PID: 8705 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1555.806126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.806130] Call Trace: [ 1555.806148] dump_stack+0x107/0x167 [ 1555.806162] should_fail.cold+0x5/0xa [ 1555.806179] ? create_object.isra.0+0x3a/0xa20 [ 1555.806199] should_failslab+0x5/0x20 [ 1555.806217] kmem_cache_alloc+0x5b/0x310 [ 1555.806274] ? mark_held_locks+0x9e/0xe0 [ 1555.806290] create_object.isra.0+0x3a/0xa20 [ 1555.806303] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1555.806320] kmem_cache_alloc_trace+0x151/0x320 [ 1555.806343] register_for_each_vma+0x476/0xc00 [ 1555.806369] __uprobe_register+0x4df/0x880 [ 1555.806397] probe_event_enable+0x368/0xa20 [ 1555.806410] ? uprobe_perf_close+0x5f0/0x5f0 [ 1555.806429] trace_uprobe_register+0x54/0x730 [ 1555.806452] perf_trace_event_init+0x554/0x9c0 [ 1555.806470] perf_uprobe_init+0x173/0x210 [ 1555.806491] perf_uprobe_event_init+0xff/0x1d0 [ 1555.806502] perf_try_init_event+0x130/0x570 [ 1555.806516] perf_event_alloc.part.0+0xd96/0x2b70 [ 1555.806537] __do_sys_perf_event_open+0x579/0x2e60 [ 1555.806560] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1555.806573] ? perf_event_set_output+0x5b0/0x5b0 [ 1555.806584] ? wait_for_completion_io+0x270/0x270 [ 1555.806612] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.806624] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.806640] do_syscall_64+0x33/0x40 [ 1555.806653] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.806661] RIP: 0033:0x7f08909a9b19 [ 1555.806672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.806678] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1555.806732] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1555.806739] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1555.806746] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.806753] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1555.806760] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1555.813658] FAULT_INJECTION: forcing a failure. [ 1555.813658] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.813670] CPU: 1 PID: 8712 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1555.813676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.813680] Call Trace: [ 1555.813754] dump_stack+0x107/0x167 [ 1555.813770] should_fail.cold+0x5/0xa [ 1555.813783] ? register_for_each_vma+0x476/0xc00 [ 1555.813797] should_failslab+0x5/0x20 [ 1555.813808] kmem_cache_alloc_trace+0x55/0x320 [ 1555.813826] register_for_each_vma+0x476/0xc00 [ 1555.813851] __uprobe_register+0x4df/0x880 [ 1555.813874] probe_event_enable+0x368/0xa20 [ 1555.813887] ? uprobe_perf_close+0x5f0/0x5f0 [ 1555.813905] trace_uprobe_register+0x54/0x730 [ 1555.813924] perf_trace_event_init+0x554/0x9c0 [ 1555.813942] perf_uprobe_init+0x173/0x210 [ 1555.813958] perf_uprobe_event_init+0xff/0x1d0 [ 1555.813969] perf_try_init_event+0x130/0x570 [ 1555.813983] perf_event_alloc.part.0+0xd96/0x2b70 [ 1555.814003] __do_sys_perf_event_open+0x579/0x2e60 [ 1555.814022] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1555.814035] ? perf_event_set_output+0x5b0/0x5b0 [ 1555.814046] ? wait_for_completion_io+0x270/0x270 [ 1555.814074] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.814085] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.814099] do_syscall_64+0x33/0x40 [ 1555.814109] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.814117] RIP: 0033:0x7f229d85eb19 [ 1555.814128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.814134] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1555.814146] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1555.814152] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1555.814159] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.814166] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1555.814172] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1555.880957] FAULT_INJECTION: forcing a failure. [ 1555.880957] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.880971] CPU: 0 PID: 8721 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1555.880978] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1555.880982] Call Trace: [ 1555.880997] dump_stack+0x107/0x167 [ 1555.881010] should_fail.cold+0x5/0xa [ 1555.881026] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1555.881039] should_failslab+0x5/0x20 [ 1555.881052] kmem_cache_alloc_trace+0x55/0x320 [ 1555.881065] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1555.881086] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1555.881101] __list_lru_init+0x44d/0x890 [ 1555.881118] alloc_super+0x8b8/0xa90 [ 1555.881130] ? fput+0x20/0x20 [ 1555.881140] sget_fc+0x110/0x860 [ 1555.881151] ? set_anon_super+0xc0/0xc0 [ 1555.881164] ? rpc_kill_sb+0x1b0/0x1b0 [ 1555.881175] get_tree_keyed+0x55/0x210 [ 1555.881187] vfs_get_tree+0x8e/0x300 [ 1555.881199] path_mount+0x1429/0x2120 [ 1555.881215] ? strncpy_from_user+0x9e/0x470 [ 1555.881227] ? finish_automount+0xa90/0xa90 [ 1555.881243] ? getname_flags.part.0+0x1dd/0x4f0 [ 1555.881261] __x64_sys_mount+0x282/0x300 [ 1555.881272] ? copy_mnt_ns+0xa00/0xa00 [ 1555.881289] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1555.881302] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1555.881315] do_syscall_64+0x33/0x40 [ 1555.881328] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1555.881336] RIP: 0033:0x7fe8bba05b19 [ 1555.881348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1555.881355] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1555.881368] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1555.881375] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1555.881382] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.881389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1555.881396] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:17:12 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 47) 02:17:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x80087601, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1570.684922] FAULT_INJECTION: forcing a failure. [ 1570.684922] name failslab, interval 1, probability 0, space 0, times 0 [ 1570.685937] CPU: 0 PID: 8747 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1570.686508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.687200] Call Trace: [ 1570.687432] dump_stack+0x107/0x167 02:17:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0045878, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:12 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 43) 02:17:12 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 62) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:17:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:17:12 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0045878, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:12 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1570.687749] should_fail.cold+0x5/0xa [ 1570.700599] ? create_object.isra.0+0x3a/0xa20 [ 1570.700994] should_failslab+0x5/0x20 [ 1570.701324] kmem_cache_alloc+0x5b/0x310 [ 1570.701674] ? mark_held_locks+0x9e/0xe0 [ 1570.702021] create_object.isra.0+0x3a/0xa20 [ 1570.702395] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1570.702827] kmem_cache_alloc_trace+0x151/0x320 [ 1570.703226] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1570.703645] __list_lru_init+0x44d/0x890 [ 1570.704006] alloc_super+0x8b8/0xa90 [ 1570.704321] ? fput+0x20/0x20 [ 1570.704585] sget_fc+0x110/0x860 [ 1570.704871] ? set_anon_super+0xc0/0xc0 [ 1570.705207] ? rpc_kill_sb+0x1b0/0x1b0 [ 1570.705535] get_tree_keyed+0x55/0x210 [ 1570.705863] vfs_get_tree+0x8e/0x300 [ 1570.706177] path_mount+0x1429/0x2120 [ 1570.706506] ? strncpy_from_user+0x9e/0x470 [ 1570.706868] ? finish_automount+0xa90/0xa90 [ 1570.707231] ? getname_flags.part.0+0x1dd/0x4f0 [ 1570.707632] __x64_sys_mount+0x282/0x300 [ 1570.708000] ? copy_mnt_ns+0xa00/0xa00 [ 1570.708333] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1570.708776] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.709212] do_syscall_64+0x33/0x40 [ 1570.709527] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1570.709958] RIP: 0033:0x7fe8bba05b19 [ 1570.710274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.711825] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1570.712466] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1570.713069] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1570.713667] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.714265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1570.714862] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1570.723288] FAULT_INJECTION: forcing a failure. [ 1570.723288] name failslab, interval 1, probability 0, space 0, times 0 [ 1570.724400] CPU: 1 PID: 8732 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1570.724976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.725670] Call Trace: [ 1570.725898] dump_stack+0x107/0x167 [ 1570.726210] should_fail.cold+0x5/0xa [ 1570.726547] ? register_for_each_vma+0x476/0xc00 [ 1570.726959] should_failslab+0x5/0x20 [ 1570.727285] kmem_cache_alloc_trace+0x55/0x320 [ 1570.727678] register_for_each_vma+0x476/0xc00 [ 1570.732117] __uprobe_register+0x4df/0x880 [ 1570.732500] probe_event_enable+0x368/0xa20 [ 1570.732866] ? uprobe_perf_close+0x5f0/0x5f0 [ 1570.733250] trace_uprobe_register+0x54/0x730 [ 1570.733639] perf_trace_event_init+0x554/0x9c0 [ 1570.734031] perf_uprobe_init+0x173/0x210 [ 1570.734392] perf_uprobe_event_init+0xff/0x1d0 [ 1570.734785] perf_try_init_event+0x130/0x570 [ 1570.735157] perf_event_alloc.part.0+0xd96/0x2b70 [ 1570.735572] __do_sys_perf_event_open+0x579/0x2e60 [ 1570.736033] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1570.736440] ? perf_event_set_output+0x5b0/0x5b0 [ 1570.736840] ? wait_for_completion_io+0x270/0x270 [ 1570.737265] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1570.737705] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.738141] do_syscall_64+0x33/0x40 [ 1570.738458] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1570.738889] RIP: 0033:0x7f229d85eb19 [ 1570.739204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.740758] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1570.741397] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1570.741992] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1570.742587] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.743179] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1570.743787] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:17:13 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0189436, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:13 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e6574646576", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1570.769916] FAULT_INJECTION: forcing a failure. [ 1570.769916] name failslab, interval 1, probability 0, space 0, times 0 [ 1570.770907] CPU: 1 PID: 8745 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1570.771484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.772210] Call Trace: [ 1570.772441] dump_stack+0x107/0x167 [ 1570.772757] should_fail.cold+0x5/0xa [ 1570.773089] ? register_for_each_vma+0x476/0xc00 [ 1570.773495] should_failslab+0x5/0x20 [ 1570.773823] kmem_cache_alloc_trace+0x55/0x320 [ 1570.774213] register_for_each_vma+0x476/0xc00 [ 1570.774611] __uprobe_register+0x4df/0x880 [ 1570.774988] probe_event_enable+0x368/0xa20 [ 1570.775355] ? uprobe_perf_close+0x5f0/0x5f0 [ 1570.775732] trace_uprobe_register+0x54/0x730 [ 1570.776153] perf_trace_event_init+0x554/0x9c0 [ 1570.776546] perf_uprobe_init+0x173/0x210 [ 1570.776909] perf_uprobe_event_init+0xff/0x1d0 [ 1570.777294] perf_try_init_event+0x130/0x570 [ 1570.777668] perf_event_alloc.part.0+0xd96/0x2b70 [ 1570.778082] __do_sys_perf_event_open+0x579/0x2e60 [ 1570.778509] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1570.778918] ? perf_event_set_output+0x5b0/0x5b0 [ 1570.779317] ? wait_for_completion_io+0x270/0x270 [ 1570.779745] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1570.780232] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.780668] do_syscall_64+0x33/0x40 [ 1570.780985] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1570.781417] RIP: 0033:0x7f08909a9b19 [ 1570.781734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.783267] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1570.787947] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1570.788543] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1570.789138] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.789732] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1570.790326] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:17:13 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 63) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:17:13 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc020660b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:13 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0045878, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:13 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e6574646576", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:17:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:17:13 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 48) 02:17:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1570.894106] FAULT_INJECTION: forcing a failure. [ 1570.894106] name failslab, interval 1, probability 0, space 0, times 0 [ 1570.895212] CPU: 0 PID: 8766 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1570.895791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.896563] Call Trace: [ 1570.896793] dump_stack+0x107/0x167 [ 1570.897175] should_fail.cold+0x5/0xa [ 1570.897499] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1570.897927] should_failslab+0x5/0x20 [ 1570.898304] kmem_cache_alloc_trace+0x55/0x320 [ 1570.898693] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1570.899171] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1570.899587] __list_lru_init+0x44d/0x890 [ 1570.899988] alloc_super+0x8b8/0xa90 [ 1570.900357] ? fput+0x20/0x20 [ 1570.900622] sget_fc+0x110/0x860 [ 1570.900909] ? set_anon_super+0xc0/0xc0 [ 1570.901319] ? rpc_kill_sb+0x1b0/0x1b0 [ 1570.901649] get_tree_keyed+0x55/0x210 [ 1570.901979] vfs_get_tree+0x8e/0x300 [ 1570.902344] path_mount+0x1429/0x2120 [ 1570.902674] ? strncpy_from_user+0x9e/0x470 [ 1570.903128] ? finish_automount+0xa90/0xa90 [ 1570.903499] ? getname_flags.part.0+0x1dd/0x4f0 [ 1570.903952] __x64_sys_mount+0x282/0x300 [ 1570.904358] ? copy_mnt_ns+0xa00/0xa00 [ 1570.904696] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1570.905141] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.905575] do_syscall_64+0x33/0x40 [ 1570.905891] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1570.906322] RIP: 0033:0x7fe8bba05b19 [ 1570.906638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.908215] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1570.908857] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1570.909456] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1570.910054] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.910652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1570.911250] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1570.950598] blktrace: Concurrent blktraces are not allowed on sg0 [ 1570.953643] FAULT_INJECTION: forcing a failure. [ 1570.953643] name failslab, interval 1, probability 0, space 0, times 0 [ 1570.954756] CPU: 1 PID: 8775 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1570.955330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.956042] Call Trace: [ 1570.956275] dump_stack+0x107/0x167 [ 1570.956590] should_fail.cold+0x5/0xa [ 1570.956922] ? create_object.isra.0+0x3a/0xa20 [ 1570.957318] should_failslab+0x5/0x20 [ 1570.957651] kmem_cache_alloc+0x5b/0x310 [ 1570.958002] ? mark_held_locks+0x9e/0xe0 [ 1570.958352] create_object.isra.0+0x3a/0xa20 [ 1570.958729] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1570.959165] kmem_cache_alloc_trace+0x151/0x320 [ 1570.959572] register_for_each_vma+0x476/0xc00 [ 1570.959989] __uprobe_register+0x4df/0x880 [ 1570.960376] probe_event_enable+0x368/0xa20 [ 1570.960748] ? uprobe_perf_close+0x5f0/0x5f0 [ 1570.961131] trace_uprobe_register+0x54/0x730 [ 1570.961524] perf_trace_event_init+0x554/0x9c0 [ 1570.961920] perf_uprobe_init+0x173/0x210 [ 1570.962284] perf_uprobe_event_init+0xff/0x1d0 [ 1570.962673] perf_try_init_event+0x130/0x570 [ 1570.963050] perf_event_alloc.part.0+0xd96/0x2b70 [ 1570.963469] __do_sys_perf_event_open+0x579/0x2e60 [ 1570.963916] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1570.964329] ? perf_event_set_output+0x5b0/0x5b0 [ 1570.964732] ? wait_for_completion_io+0x270/0x270 [ 1570.965161] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1570.965607] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1570.966048] do_syscall_64+0x33/0x40 [ 1570.966369] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1570.966802] RIP: 0033:0x7f229d85eb19 [ 1570.967121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.968676] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1570.969321] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1570.969921] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1570.970519] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.971118] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1570.971718] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:17:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481223, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:26 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 49) 02:17:26 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e6574646576", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:17:26 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 64) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1583.924749] blktrace: Concurrent blktraces are not allowed on sg0 [ 1583.935427] FAULT_INJECTION: forcing a failure. [ 1583.935427] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.936336] FAULT_INJECTION: forcing a failure. [ 1583.936336] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.936420] CPU: 1 PID: 8784 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1583.937982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1583.938681] Call Trace: [ 1583.938916] dump_stack+0x107/0x167 [ 1583.939232] should_fail.cold+0x5/0xa [ 1583.939570] ? register_for_each_vma+0x476/0xc00 [ 1583.940003] should_failslab+0x5/0x20 [ 1583.940333] kmem_cache_alloc_trace+0x55/0x320 [ 1583.940759] register_for_each_vma+0x476/0xc00 [ 1583.941169] __uprobe_register+0x4df/0x880 [ 1583.941545] probe_event_enable+0x368/0xa20 [ 1583.941913] ? uprobe_perf_close+0x5f0/0x5f0 [ 1583.942291] trace_uprobe_register+0x54/0x730 [ 1583.942679] perf_trace_event_init+0x554/0x9c0 [ 1583.943069] perf_uprobe_init+0x173/0x210 [ 1583.943428] perf_uprobe_event_init+0xff/0x1d0 [ 1583.943811] perf_try_init_event+0x130/0x570 [ 1583.944199] perf_event_alloc.part.0+0xd96/0x2b70 [ 1583.944614] __do_sys_perf_event_open+0x579/0x2e60 [ 1583.945039] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1583.945447] ? perf_event_set_output+0x5b0/0x5b0 [ 1583.945856] ? wait_for_completion_io+0x270/0x270 [ 1583.946287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1583.946733] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1583.947168] do_syscall_64+0x33/0x40 [ 1583.947484] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1583.947923] RIP: 0033:0x7f229d85eb19 [ 1583.948242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1583.949777] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1583.950419] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1583.951018] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1583.951614] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1583.952241] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1583.952833] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1583.953447] CPU: 0 PID: 8798 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1583.954092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1583.954880] Call Trace: [ 1583.955133] dump_stack+0x107/0x167 [ 1583.955476] should_fail.cold+0x5/0xa [ 1583.955827] ? create_object.isra.0+0x3a/0xa20 [ 1583.956268] should_failslab+0x5/0x20 [ 1583.956615] kmem_cache_alloc+0x5b/0x310 [ 1583.956988] ? mark_held_locks+0x9e/0xe0 [ 1583.957359] create_object.isra.0+0x3a/0xa20 [ 1583.957755] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1583.958224] kmem_cache_alloc_trace+0x151/0x320 [ 1583.958659] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1583.959127] __list_lru_init+0x44d/0x890 [ 1583.959507] alloc_super+0x8b8/0xa90 [ 1583.959893] ? fput+0x20/0x20 [ 1583.960190] sget_fc+0x110/0x860 [ 1583.960503] ? set_anon_super+0xc0/0xc0 [ 1583.960869] ? rpc_kill_sb+0x1b0/0x1b0 [ 1583.961225] get_tree_keyed+0x55/0x210 [ 1583.961587] vfs_get_tree+0x8e/0x300 [ 1583.961934] path_mount+0x1429/0x2120 [ 1583.962299] ? strncpy_from_user+0x9e/0x470 [ 1583.962718] ? finish_automount+0xa90/0xa90 [ 1583.963143] ? getname_flags.part.0+0x1dd/0x4f0 [ 1583.963586] __x64_sys_mount+0x282/0x300 [ 1583.963998] ? copy_mnt_ns+0xa00/0xa00 [ 1583.964360] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1583.964843] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1583.965314] do_syscall_64+0x33/0x40 [ 1583.965654] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1583.966121] RIP: 0033:0x7fe8bba05b19 [ 1583.966466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1583.968179] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1583.968852] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1583.969499] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1583.970139] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1583.970786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1583.971421] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:17:26 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 44) 02:17:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:17:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0189436, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1583.988192] FAULT_INJECTION: forcing a failure. [ 1583.988192] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.989297] CPU: 1 PID: 8796 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1583.989872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1583.995972] Call Trace: [ 1583.996275] dump_stack+0x107/0x167 [ 1583.996654] should_fail.cold+0x5/0xa [ 1583.997051] ? create_object.isra.0+0x3a/0xa20 [ 1583.997529] should_failslab+0x5/0x20 [ 1583.997929] kmem_cache_alloc+0x5b/0x310 [ 1583.998356] ? mark_held_locks+0x9e/0xe0 [ 1583.998775] create_object.isra.0+0x3a/0xa20 [ 1583.999226] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1583.999751] kmem_cache_alloc_trace+0x151/0x320 [ 1584.000220] register_for_each_vma+0x476/0xc00 [ 1584.000701] __uprobe_register+0x4df/0x880 [ 1584.001210] probe_event_enable+0x368/0xa20 [ 1584.001661] ? uprobe_perf_close+0x5f0/0x5f0 [ 1584.002140] trace_uprobe_register+0x54/0x730 [ 1584.002604] perf_trace_event_init+0x554/0x9c0 [ 1584.003075] perf_uprobe_init+0x173/0x210 [ 1584.003504] perf_uprobe_event_init+0xff/0x1d0 [ 1584.004014] perf_try_init_event+0x130/0x570 [ 1584.004390] perf_event_alloc.part.0+0xd96/0x2b70 [ 1584.004809] __do_sys_perf_event_open+0x579/0x2e60 [ 1584.005232] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1584.005638] ? perf_event_set_output+0x5b0/0x5b0 [ 1584.006040] ? wait_for_completion_io+0x270/0x270 [ 1584.006462] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1584.006902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1584.007338] do_syscall_64+0x33/0x40 [ 1584.007654] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1584.008121] RIP: 0033:0x7f08909a9b19 [ 1584.008498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1584.010442] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1584.011217] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1584.011946] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1584.012551] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1584.013189] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1584.013820] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:17:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481225, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc020660b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:17:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), 0x4) gettid() 02:17:26 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e6571", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:17:26 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 65) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1584.114929] blktrace: Concurrent blktraces are not allowed on sg0 [ 1584.126157] FAULT_INJECTION: forcing a failure. [ 1584.126157] name failslab, interval 1, probability 0, space 0, times 0 [ 1584.127184] CPU: 1 PID: 8814 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1584.127760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1584.128467] Call Trace: [ 1584.128702] dump_stack+0x107/0x167 [ 1584.129014] should_fail.cold+0x5/0xa [ 1584.129344] ? create_object.isra.0+0x3a/0xa20 [ 1584.129740] should_failslab+0x5/0x20 [ 1584.130103] kmem_cache_alloc+0x5b/0x310 [ 1584.130469] ? mark_held_locks+0x9e/0xe0 [ 1584.130820] create_object.isra.0+0x3a/0xa20 [ 1584.131225] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1584.131661] kmem_cache_alloc_trace+0x151/0x320 [ 1584.132088] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1584.132520] __list_lru_init+0x44d/0x890 [ 1584.132877] alloc_super+0x8b8/0xa90 [ 1584.133233] ? fput+0x20/0x20 [ 1584.133503] sget_fc+0x110/0x860 [ 1584.133795] ? set_anon_super+0xc0/0xc0 [ 1584.134141] ? rpc_kill_sb+0x1b0/0x1b0 [ 1584.134473] get_tree_keyed+0x55/0x210 [ 1584.134807] vfs_get_tree+0x8e/0x300 [ 1584.135126] path_mount+0x1429/0x2120 [ 1584.135460] ? strncpy_from_user+0x9e/0x470 [ 1584.135828] ? finish_automount+0xa90/0xa90 [ 1584.136239] ? getname_flags.part.0+0x1dd/0x4f0 [ 1584.136655] __x64_sys_mount+0x282/0x300 [ 1584.136999] ? copy_mnt_ns+0xa00/0xa00 [ 1584.137335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1584.137782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1584.138230] do_syscall_64+0x33/0x40 [ 1584.138551] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1584.138990] RIP: 0033:0x7fe8bba05b19 [ 1584.139308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1584.140879] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1584.141520] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1584.142127] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1584.142730] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1584.143350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1584.143961] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:17:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122a, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:26 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 45) 02:17:26 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), 0x4) gettid() [ 1584.272422] FAULT_INJECTION: forcing a failure. [ 1584.272422] name failslab, interval 1, probability 0, space 0, times 0 [ 1584.273529] CPU: 0 PID: 8827 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1584.274146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1584.274938] Call Trace: [ 1584.275193] dump_stack+0x107/0x167 [ 1584.275544] should_fail.cold+0x5/0xa [ 1584.275918] ? register_for_each_vma+0x476/0xc00 [ 1584.276378] should_failslab+0x5/0x20 [ 1584.276736] kmem_cache_alloc_trace+0x55/0x320 [ 1584.277168] register_for_each_vma+0x476/0xc00 [ 1584.278248] __uprobe_register+0x4df/0x880 [ 1584.279108] probe_event_enable+0x368/0xa20 [ 1584.279992] ? uprobe_perf_close+0x5f0/0x5f0 [ 1584.280882] trace_uprobe_register+0x54/0x730 [ 1584.281810] perf_trace_event_init+0x554/0x9c0 [ 1584.282753] perf_uprobe_init+0x173/0x210 [ 1584.283577] perf_uprobe_event_init+0xff/0x1d0 [ 1584.284682] perf_try_init_event+0x130/0x570 [ 1584.285776] perf_event_alloc.part.0+0xd96/0x2b70 [ 1584.286954] __do_sys_perf_event_open+0x579/0x2e60 [ 1584.288248] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1584.289443] ? perf_event_set_output+0x5b0/0x5b0 [ 1584.290602] ? wait_for_completion_io+0x270/0x270 [ 1584.291852] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1584.293162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1584.294488] do_syscall_64+0x33/0x40 [ 1584.295440] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1584.296710] RIP: 0033:0x7f08909a9b19 [ 1584.297631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1584.302168] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1584.304079] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1584.305790] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1584.307571] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1584.309395] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1584.311175] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:17:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:17:40 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 46) 02:17:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), 0x4) gettid() [ 1597.960890] blktrace: Concurrent blktraces are not allowed on sg0 [ 1597.961531] FAULT_INJECTION: forcing a failure. [ 1597.961531] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.961547] CPU: 1 PID: 8841 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1597.961554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 02:17:40 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e6571", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:17:40 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 50) 02:17:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc048120a, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:40 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 66) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1597.961559] Call Trace: [ 1597.961576] dump_stack+0x107/0x167 [ 1597.961591] should_fail.cold+0x5/0xa [ 1597.961606] ? create_object.isra.0+0x3a/0xa20 [ 1597.961621] should_failslab+0x5/0x20 [ 1597.961633] kmem_cache_alloc+0x5b/0x310 [ 1597.961647] ? mark_held_locks+0x9e/0xe0 [ 1597.961663] create_object.isra.0+0x3a/0xa20 [ 1597.961678] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1597.961697] kmem_cache_alloc_trace+0x151/0x320 [ 1597.973398] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1597.973855] __list_lru_init+0x44d/0x890 [ 1597.974263] alloc_super+0x8b8/0xa90 [ 1597.974617] ? fput+0x20/0x20 [ 1597.974904] sget_fc+0x110/0x860 [ 1597.975254] ? set_anon_super+0xc0/0xc0 [ 1597.975620] ? rpc_kill_sb+0x1b0/0x1b0 [ 1597.975993] get_tree_keyed+0x55/0x210 [ 1597.976429] vfs_get_tree+0x8e/0x300 [ 1597.976821] path_mount+0x1429/0x2120 [ 1597.977230] ? strncpy_from_user+0x9e/0x470 [ 1597.977683] ? finish_automount+0xa90/0xa90 [ 1597.978157] ? getname_flags.part.0+0x1dd/0x4f0 [ 1597.978693] __x64_sys_mount+0x282/0x300 [ 1597.979137] ? copy_mnt_ns+0xa00/0xa00 [ 1597.979551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1597.980122] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1597.980685] do_syscall_64+0x33/0x40 [ 1597.981076] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1597.981646] RIP: 0033:0x7fe8bba05b19 [ 1597.982075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1597.983949] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1597.984762] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1597.985525] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1597.986297] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1597.987047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1597.987788] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1597.996728] FAULT_INJECTION: forcing a failure. [ 1597.996728] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.997991] CPU: 0 PID: 8835 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1597.998567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1597.999223] Call Trace: [ 1597.999443] dump_stack+0x107/0x167 [ 1597.999740] should_fail.cold+0x5/0xa [ 1598.000066] ? create_object.isra.0+0x3a/0xa20 [ 1598.000482] should_failslab+0x5/0x20 [ 1598.000798] kmem_cache_alloc+0x5b/0x310 [ 1598.001159] ? mark_held_locks+0x9e/0xe0 [ 1598.001493] create_object.isra.0+0x3a/0xa20 [ 1598.001848] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1598.002271] kmem_cache_alloc_trace+0x151/0x320 [ 1598.002659] register_for_each_vma+0x476/0xc00 [ 1598.003046] __uprobe_register+0x4df/0x880 [ 1598.003408] probe_event_enable+0x368/0xa20 [ 1598.003758] ? uprobe_perf_close+0x5f0/0x5f0 [ 1598.004150] trace_uprobe_register+0x54/0x730 [ 1598.004599] perf_trace_event_init+0x554/0x9c0 [ 1598.005047] perf_uprobe_init+0x173/0x210 [ 1598.005459] perf_uprobe_event_init+0xff/0x1d0 [ 1598.005899] perf_try_init_event+0x130/0x570 [ 1598.006326] perf_event_alloc.part.0+0xd96/0x2b70 [ 1598.006801] __do_sys_perf_event_open+0x579/0x2e60 [ 1598.007300] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1598.007772] ? perf_event_set_output+0x5b0/0x5b0 [ 1598.008213] ? wait_for_completion_io+0x270/0x270 [ 1598.008618] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1598.009039] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1598.009456] do_syscall_64+0x33/0x40 [ 1598.009759] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1598.010171] RIP: 0033:0x7f08909a9b19 [ 1598.010482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1598.011944] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1598.012767] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1598.013468] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1598.014128] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1598.014853] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1598.015563] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:17:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122d, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:40 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e6571", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:17:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:17:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481223, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:40 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 67) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:17:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, 0x0, 0x0) gettid() [ 1598.133562] FAULT_INJECTION: forcing a failure. [ 1598.133562] name failslab, interval 1, probability 0, space 0, times 0 [ 1598.136238] CPU: 0 PID: 8849 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1598.137405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1598.138724] FAULT_INJECTION: forcing a failure. [ 1598.138724] name failslab, interval 1, probability 0, space 0, times 0 [ 1598.138820] Call Trace: [ 1598.138840] dump_stack+0x107/0x167 [ 1598.138855] should_fail.cold+0x5/0xa [ 1598.141238] ? create_object.isra.0+0x3a/0xa20 [ 1598.141658] should_failslab+0x5/0x20 [ 1598.141968] kmem_cache_alloc+0x5b/0x310 [ 1598.142300] ? mark_held_locks+0x9e/0xe0 [ 1598.142652] create_object.isra.0+0x3a/0xa20 [ 1598.143005] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1598.143414] kmem_cache_alloc_trace+0x151/0x320 [ 1598.143792] register_for_each_vma+0x476/0xc00 [ 1598.144274] __uprobe_register+0x4df/0x880 [ 1598.145034] probe_event_enable+0x368/0xa20 [ 1598.145774] ? uprobe_perf_close+0x5f0/0x5f0 [ 1598.146505] trace_uprobe_register+0x54/0x730 [ 1598.147250] perf_trace_event_init+0x554/0x9c0 [ 1598.148068] perf_uprobe_init+0x173/0x210 [ 1598.149010] perf_uprobe_event_init+0xff/0x1d0 [ 1598.149758] perf_try_init_event+0x130/0x570 [ 1598.150495] perf_event_alloc.part.0+0xd96/0x2b70 [ 1598.151321] __do_sys_perf_event_open+0x579/0x2e60 [ 1598.152120] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1598.152504] ? perf_event_set_output+0x5b0/0x5b0 [ 1598.152878] ? wait_for_completion_io+0x270/0x270 [ 1598.153281] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1598.153744] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1598.154156] do_syscall_64+0x33/0x40 [ 1598.154483] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1598.154888] RIP: 0033:0x7f229d85eb19 [ 1598.155187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1598.156763] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1598.157407] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1598.157980] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1598.158549] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1598.159111] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1598.159717] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1598.160805] CPU: 1 PID: 8863 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1598.161989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1598.163460] Call Trace: [ 1598.163903] dump_stack+0x107/0x167 [ 1598.164769] should_fail.cold+0x5/0xa [ 1598.165489] ? create_object.isra.0+0x3a/0xa20 [ 1598.166355] should_failslab+0x5/0x20 [ 1598.167103] kmem_cache_alloc+0x5b/0x310 [ 1598.167898] ? mark_held_locks+0x9e/0xe0 [ 1598.168340] create_object.isra.0+0x3a/0xa20 [ 1598.168711] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1598.169140] kmem_cache_alloc_trace+0x151/0x320 [ 1598.169568] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1598.169997] __list_lru_init+0x44d/0x890 [ 1598.170351] alloc_super+0x8b8/0xa90 [ 1598.170692] ? fput+0x20/0x20 [ 1598.170955] sget_fc+0x110/0x860 [ 1598.171241] ? set_anon_super+0xc0/0xc0 [ 1598.171576] ? rpc_kill_sb+0x1b0/0x1b0 [ 1598.171903] get_tree_keyed+0x55/0x210 [ 1598.172728] vfs_get_tree+0x8e/0x300 [ 1598.173468] path_mount+0x1429/0x2120 [ 1598.174216] ? strncpy_from_user+0x9e/0x470 [ 1598.175057] ? finish_automount+0xa90/0xa90 [ 1598.175946] ? getname_flags.part.0+0x1dd/0x4f0 [ 1598.177026] __x64_sys_mount+0x282/0x300 [ 1598.177711] ? copy_mnt_ns+0xa00/0xa00 [ 1598.178378] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1598.179311] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1598.180148] do_syscall_64+0x33/0x40 [ 1598.180496] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1598.180960] RIP: 0033:0x7fe8bba05b19 [ 1598.181305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1598.183013] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1598.183697] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1598.184779] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1598.186004] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1598.187199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1598.188611] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:17:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122e, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:54 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:17:54 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 51) 02:17:54 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 47) 02:17:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:17:54 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 68) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:17:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481225, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, 0x0, 0x0) gettid() 02:17:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048122f, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1611.871587] FAULT_INJECTION: forcing a failure. [ 1611.871587] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.875986] CPU: 0 PID: 8890 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1611.876619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.877112] FAULT_INJECTION: forcing a failure. [ 1611.877112] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.877335] Call Trace: [ 1611.877356] dump_stack+0x107/0x167 [ 1611.877371] should_fail.cold+0x5/0xa [ 1611.879119] ? create_object.isra.0+0x3a/0xa20 [ 1611.879551] should_failslab+0x5/0x20 [ 1611.879878] kmem_cache_alloc+0x5b/0x310 [ 1611.880255] ? mark_held_locks+0x9e/0xe0 [ 1611.880690] create_object.isra.0+0x3a/0xa20 [ 1611.881107] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1611.881589] kmem_cache_alloc_trace+0x151/0x320 [ 1611.882032] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1611.882491] __list_lru_init+0x44d/0x890 [ 1611.882876] alloc_super+0x8b8/0xa90 [ 1611.883228] ? fput+0x20/0x20 [ 1611.883527] sget_fc+0x110/0x860 [ 1611.883839] ? set_anon_super+0xc0/0xc0 [ 1611.884233] ? rpc_kill_sb+0x1b0/0x1b0 [ 1611.884575] get_tree_keyed+0x55/0x210 [ 1611.884905] vfs_get_tree+0x8e/0x300 [ 1611.885227] path_mount+0x1429/0x2120 [ 1611.885564] ? strncpy_from_user+0x9e/0x470 [ 1611.885926] ? finish_automount+0xa90/0xa90 [ 1611.886294] ? getname_flags.part.0+0x1dd/0x4f0 [ 1611.886694] __x64_sys_mount+0x282/0x300 [ 1611.887037] ? copy_mnt_ns+0xa00/0xa00 [ 1611.887383] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.887829] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.888304] do_syscall_64+0x33/0x40 [ 1611.888620] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.889048] RIP: 0033:0x7fe8bba05b19 [ 1611.889394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.890964] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1611.891637] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1611.892267] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1611.892911] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1611.893543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1611.894137] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1611.894754] CPU: 1 PID: 8885 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1611.895379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.896097] Call Trace: [ 1611.896367] dump_stack+0x107/0x167 [ 1611.896699] should_fail.cold+0x5/0xa [ 1611.897055] ? register_for_each_vma+0x476/0xc00 [ 1611.897500] should_failslab+0x5/0x20 [ 1611.897860] kmem_cache_alloc_trace+0x55/0x320 [ 1611.898291] register_for_each_vma+0x476/0xc00 [ 1611.898729] __uprobe_register+0x4df/0x880 [ 1611.899147] probe_event_enable+0x368/0xa20 [ 1611.899582] ? uprobe_perf_close+0x5f0/0x5f0 [ 1611.899996] trace_uprobe_register+0x54/0x730 [ 1611.900458] perf_trace_event_init+0x554/0x9c0 [ 1611.900889] perf_uprobe_init+0x173/0x210 [ 1611.901280] perf_uprobe_event_init+0xff/0x1d0 [ 1611.901688] perf_try_init_event+0x130/0x570 [ 1611.902082] perf_event_alloc.part.0+0xd96/0x2b70 [ 1611.902531] __do_sys_perf_event_open+0x579/0x2e60 [ 1611.903000] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1611.903446] ? perf_event_set_output+0x5b0/0x5b0 [ 1611.903896] ? wait_for_completion_io+0x270/0x270 [ 1611.904396] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.904888] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.905363] do_syscall_64+0x33/0x40 [ 1611.905721] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.906195] RIP: 0033:0x7f08909a9b19 [ 1611.906538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.908190] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1611.908880] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1611.909532] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1611.910264] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1611.910923] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1611.911578] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:17:54 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:17:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc048122a, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1611.976802] FAULT_INJECTION: forcing a failure. [ 1611.976802] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.977911] CPU: 0 PID: 8888 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1611.978526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1611.979267] Call Trace: [ 1611.979525] dump_stack+0x107/0x167 [ 1611.979862] should_fail.cold+0x5/0xa [ 1611.980238] ? create_object.isra.0+0x3a/0xa20 [ 1611.980673] should_failslab+0x5/0x20 [ 1611.981030] kmem_cache_alloc+0x5b/0x310 [ 1611.981405] ? mark_held_locks+0x9e/0xe0 [ 1611.981784] create_object.isra.0+0x3a/0xa20 [ 1611.982193] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1611.982677] kmem_cache_alloc_trace+0x151/0x320 [ 1611.983121] register_for_each_vma+0x476/0xc00 [ 1611.983561] __uprobe_register+0x4df/0x880 [ 1611.983979] probe_event_enable+0x368/0xa20 [ 1611.984401] ? uprobe_perf_close+0x5f0/0x5f0 [ 1611.984842] trace_uprobe_register+0x54/0x730 [ 1611.985270] perf_trace_event_init+0x554/0x9c0 [ 1611.985749] perf_uprobe_init+0x173/0x210 [ 1611.986149] perf_uprobe_event_init+0xff/0x1d0 [ 1611.986576] perf_try_init_event+0x130/0x570 [ 1611.986984] perf_event_alloc.part.0+0xd96/0x2b70 [ 1611.987436] __do_sys_perf_event_open+0x579/0x2e60 [ 1611.987907] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1611.988366] ? perf_event_set_output+0x5b0/0x5b0 [ 1611.988795] ? wait_for_completion_io+0x270/0x270 [ 1611.989258] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1611.989733] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.990202] do_syscall_64+0x33/0x40 [ 1611.990545] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1611.991004] RIP: 0033:0x7f229d85eb19 [ 1611.991344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.992998] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1611.993687] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1611.994323] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1611.994961] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1611.995607] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1611.996279] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:17:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, 0x0, 0x0) gettid() 02:17:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481230, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:17:54 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:17:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:17:54 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 48) 02:17:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc048122b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:17:54 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 69) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:17:54 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 52) [ 1612.181930] FAULT_INJECTION: forcing a failure. [ 1612.181930] name failslab, interval 1, probability 0, space 0, times 0 [ 1612.183085] CPU: 1 PID: 8923 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1612.183699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1612.184456] Call Trace: [ 1612.184710] dump_stack+0x107/0x167 [ 1612.185049] should_fail.cold+0x5/0xa [ 1612.185406] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1612.185875] should_failslab+0x5/0x20 [ 1612.186233] kmem_cache_alloc_trace+0x55/0x320 [ 1612.186654] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1612.187123] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1612.187576] __list_lru_init+0x44d/0x890 [ 1612.187958] alloc_super+0x8b8/0xa90 [ 1612.188325] ? fput+0x20/0x20 [ 1612.188614] sget_fc+0x110/0x860 [ 1612.188935] ? set_anon_super+0xc0/0xc0 [ 1612.189301] ? rpc_kill_sb+0x1b0/0x1b0 [ 1612.189656] get_tree_keyed+0x55/0x210 [ 1612.190011] vfs_get_tree+0x8e/0x300 [ 1612.190354] path_mount+0x1429/0x2120 [ 1612.190713] ? strncpy_from_user+0x9e/0x470 [ 1612.191132] ? finish_automount+0xa90/0xa90 [ 1612.191526] ? getname_flags.part.0+0x1dd/0x4f0 02:17:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1612.191985] __x64_sys_mount+0x282/0x300 [ 1612.192394] ? copy_mnt_ns+0xa00/0xa00 [ 1612.192756] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1612.193259] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1612.193684] do_syscall_64+0x33/0x40 [ 1612.194013] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1612.200206] RIP: 0033:0x7fe8bba05b19 [ 1612.200551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1612.202194] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1612.202906] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 02:17:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc048122d, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1612.203554] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1612.204248] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1612.212459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1612.213098] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1612.225170] FAULT_INJECTION: forcing a failure. [ 1612.225170] name failslab, interval 1, probability 0, space 0, times 0 [ 1612.226315] CPU: 0 PID: 8920 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1612.226967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1612.227719] Call Trace: [ 1612.227992] dump_stack+0x107/0x167 [ 1612.228379] should_fail.cold+0x5/0xa [ 1612.228740] ? create_object.isra.0+0x3a/0xa20 [ 1612.229175] should_failslab+0x5/0x20 [ 1612.229535] kmem_cache_alloc+0x5b/0x310 [ 1612.229912] ? mark_held_locks+0x9e/0xe0 [ 1612.230338] create_object.isra.0+0x3a/0xa20 [ 1612.230744] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1612.231217] kmem_cache_alloc_trace+0x151/0x320 [ 1612.231664] register_for_each_vma+0x476/0xc00 [ 1612.232103] __uprobe_register+0x4df/0x880 [ 1612.232558] probe_event_enable+0x368/0xa20 [ 1612.232953] ? uprobe_perf_close+0x5f0/0x5f0 [ 1612.233340] trace_uprobe_register+0x54/0x730 [ 1612.233772] perf_trace_event_init+0x554/0x9c0 [ 1612.234232] perf_uprobe_init+0x173/0x210 [ 1612.234622] perf_uprobe_event_init+0xff/0x1d0 [ 1612.235042] perf_try_init_event+0x130/0x570 [ 1612.235449] perf_event_alloc.part.0+0xd96/0x2b70 [ 1612.235903] __do_sys_perf_event_open+0x579/0x2e60 [ 1612.240400] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1612.240842] ? perf_event_set_output+0x5b0/0x5b0 [ 1612.241304] ? wait_for_completion_io+0x270/0x270 [ 1612.241769] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1612.242242] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1612.242715] do_syscall_64+0x33/0x40 [ 1612.243055] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1612.243516] RIP: 0033:0x7f08909a9b19 [ 1612.243855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1612.245488] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1612.246180] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1612.246825] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1612.247452] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1612.248054] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1612.248674] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1612.297473] FAULT_INJECTION: forcing a failure. [ 1612.297473] name failslab, interval 1, probability 0, space 0, times 0 [ 1612.298661] CPU: 0 PID: 8925 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1612.299294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1612.300038] Call Trace: [ 1612.300306] dump_stack+0x107/0x167 [ 1612.300618] should_fail.cold+0x5/0xa [ 1612.300943] ? create_object.isra.0+0x3a/0xa20 [ 1612.301345] should_failslab+0x5/0x20 [ 1612.301671] kmem_cache_alloc+0x5b/0x310 [ 1612.302020] ? mark_held_locks+0x9e/0xe0 [ 1612.302374] create_object.isra.0+0x3a/0xa20 [ 1612.302744] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1612.303173] kmem_cache_alloc_trace+0x151/0x320 [ 1612.303579] register_for_each_vma+0x476/0xc00 [ 1612.303978] __uprobe_register+0x4df/0x880 [ 1612.304390] probe_event_enable+0x368/0xa20 [ 1612.304755] ? uprobe_perf_close+0x5f0/0x5f0 [ 1612.305138] trace_uprobe_register+0x54/0x730 [ 1612.305538] perf_trace_event_init+0x554/0x9c0 [ 1612.305932] perf_uprobe_init+0x173/0x210 [ 1612.306305] perf_uprobe_event_init+0xff/0x1d0 [ 1612.306690] perf_try_init_event+0x130/0x570 [ 1612.307065] perf_event_alloc.part.0+0xd96/0x2b70 [ 1612.307486] __do_sys_perf_event_open+0x579/0x2e60 [ 1612.307913] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1612.308349] ? perf_event_set_output+0x5b0/0x5b0 [ 1612.308749] ? wait_for_completion_io+0x270/0x270 [ 1612.309178] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1612.309623] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1612.310061] do_syscall_64+0x33/0x40 [ 1612.310382] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1612.310811] RIP: 0033:0x7f229d85eb19 [ 1612.311126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1612.312673] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1612.313316] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1612.313910] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1612.314505] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1612.315097] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1612.315689] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:18:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc048122e, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:08 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 70) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:18:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481258, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:18:08 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:08 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 49) 02:18:08 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 53) [ 1626.594926] FAULT_INJECTION: forcing a failure. [ 1626.594926] name failslab, interval 1, probability 0, space 0, times 0 02:18:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), 0x4) gettid() [ 1626.596008] CPU: 0 PID: 8950 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1626.596675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1626.597366] Call Trace: [ 1626.597597] dump_stack+0x107/0x167 [ 1626.597906] should_fail.cold+0x5/0xa [ 1626.598230] ? create_object.isra.0+0x3a/0xa20 [ 1626.598618] should_failslab+0x5/0x20 [ 1626.598943] kmem_cache_alloc+0x5b/0x310 [ 1626.599290] ? mark_held_locks+0x9e/0xe0 [ 1626.599634] create_object.isra.0+0x3a/0xa20 [ 1626.600004] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1626.600562] kmem_cache_alloc_trace+0x151/0x320 [ 1626.600994] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1626.601489] __list_lru_init+0x44d/0x890 [ 1626.601867] alloc_super+0x8b8/0xa90 [ 1626.602255] ? fput+0x20/0x20 [ 1626.602546] sget_fc+0x110/0x860 [ 1626.602834] ? set_anon_super+0xc0/0xc0 [ 1626.603176] ? rpc_kill_sb+0x1b0/0x1b0 [ 1626.603548] get_tree_keyed+0x55/0x210 [ 1626.603877] vfs_get_tree+0x8e/0x300 [ 1626.604190] path_mount+0x1429/0x2120 [ 1626.604606] ? strncpy_from_user+0x9e/0x470 [ 1626.604968] ? finish_automount+0xa90/0xa90 [ 1626.605382] ? getname_flags.part.0+0x1dd/0x4f0 [ 1626.605780] __x64_sys_mount+0x282/0x300 [ 1626.606121] ? copy_mnt_ns+0xa00/0xa00 [ 1626.606496] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1626.606939] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1626.607417] do_syscall_64+0x33/0x40 [ 1626.607733] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1626.608160] RIP: 0033:0x7fe8bba05b19 [ 1626.608570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1626.611635] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1626.612377] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1626.612975] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1626.613617] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1626.614258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1626.614852] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:18:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481263, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1626.627074] FAULT_INJECTION: forcing a failure. [ 1626.627074] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.628348] CPU: 0 PID: 8955 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1626.628964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1626.629750] Call Trace: [ 1626.629999] dump_stack+0x107/0x167 [ 1626.630431] should_fail.cold+0x5/0xa [ 1626.630789] ? register_for_each_vma+0x476/0xc00 [ 1626.631271] should_failslab+0x5/0x20 [ 1626.631628] kmem_cache_alloc_trace+0x55/0x320 [ 1626.632055] register_for_each_vma+0x476/0xc00 [ 1626.632590] __uprobe_register+0x4df/0x880 [ 1626.632630] probe_event_enable+0x368/0xa20 [ 1626.633453] ? uprobe_perf_close+0x5f0/0x5f0 [ 1626.633868] trace_uprobe_register+0x54/0x730 [ 1626.634383] perf_trace_event_init+0x554/0x9c0 [ 1626.634815] perf_uprobe_init+0x173/0x210 [ 1626.635249] perf_uprobe_event_init+0xff/0x1d0 [ 1626.635674] perf_try_init_event+0x130/0x570 [ 1626.636083] perf_event_alloc.part.0+0xd96/0x2b70 [ 1626.636609] __do_sys_perf_event_open+0x579/0x2e60 [ 1626.637077] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1626.637597] ? perf_event_set_output+0x5b0/0x5b0 [ 1626.638030] ? wait_for_completion_io+0x270/0x270 [ 1626.638546] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1626.639026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1626.639552] do_syscall_64+0x33/0x40 [ 1626.639898] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1626.640434] RIP: 0033:0x7f229d85eb19 [ 1626.640778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1626.642536] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1626.643275] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1626.643915] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1626.644623] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1626.645340] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1626.645983] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:18:08 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1626.685145] FAULT_INJECTION: forcing a failure. [ 1626.685145] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.686370] CPU: 1 PID: 8953 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1626.686946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1626.687684] Call Trace: [ 1626.687915] dump_stack+0x107/0x167 [ 1626.688284] should_fail.cold+0x5/0xa [ 1626.688617] ? create_object.isra.0+0x3a/0xa20 [ 1626.689073] should_failslab+0x5/0x20 [ 1626.691631] kmem_cache_alloc+0x5b/0x310 [ 1626.691980] ? mark_held_locks+0x9e/0xe0 [ 1626.692397] create_object.isra.0+0x3a/0xa20 [ 1626.692770] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1626.693274] kmem_cache_alloc_trace+0x151/0x320 [ 1626.693676] register_for_each_vma+0x476/0xc00 [ 1626.694123] __uprobe_register+0x4df/0x880 [ 1626.694498] probe_event_enable+0x368/0xa20 [ 1626.694863] ? uprobe_perf_close+0x5f0/0x5f0 [ 1626.695290] trace_uprobe_register+0x54/0x730 [ 1626.695683] perf_trace_event_init+0x554/0x9c0 [ 1626.696129] perf_uprobe_init+0x173/0x210 [ 1626.696511] perf_uprobe_event_init+0xff/0x1d0 [ 1626.696894] perf_try_init_event+0x130/0x570 [ 1626.697339] perf_event_alloc.part.0+0xd96/0x2b70 [ 1626.697753] __do_sys_perf_event_open+0x579/0x2e60 [ 1626.698227] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1626.698634] ? perf_event_set_output+0x5b0/0x5b0 [ 1626.699079] ? wait_for_completion_io+0x270/0x270 [ 1626.699505] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1626.699944] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1626.700447] do_syscall_64+0x33/0x40 [ 1626.700762] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1626.701261] RIP: 0033:0x7f08909a9b19 [ 1626.701576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1626.703181] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1626.703818] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1626.704478] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1626.705160] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1626.705755] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1626.706655] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:18:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000180), 0x4) gettid() 02:18:09 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481264, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:18:09 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 71) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:18:09 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481230, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1626.811997] FAULT_INJECTION: forcing a failure. [ 1626.811997] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.813172] CPU: 1 PID: 8970 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1626.813742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1626.814503] Call Trace: [ 1626.814734] dump_stack+0x107/0x167 [ 1626.815092] should_fail.cold+0x5/0xa [ 1626.815419] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1626.815851] should_failslab+0x5/0x20 [ 1626.816227] kmem_cache_alloc_trace+0x55/0x320 [ 1626.816634] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1626.817110] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1626.817525] __list_lru_init+0x44d/0x890 [ 1626.817872] alloc_super+0x8b8/0xa90 [ 1626.818264] ? fput+0x20/0x20 [ 1626.818530] sget_fc+0x110/0x860 [ 1626.818814] ? set_anon_super+0xc0/0xc0 [ 1626.819201] ? rpc_kill_sb+0x1b0/0x1b0 [ 1626.819528] get_tree_keyed+0x55/0x210 [ 1626.819856] vfs_get_tree+0x8e/0x300 [ 1626.820219] path_mount+0x1429/0x2120 [ 1626.820580] ? strncpy_from_user+0x9e/0x470 [ 1626.820942] ? finish_automount+0xa90/0xa90 [ 1626.821354] ? getname_flags.part.0+0x1dd/0x4f0 [ 1626.821752] __x64_sys_mount+0x282/0x300 [ 1626.822169] ? copy_mnt_ns+0xa00/0xa00 [ 1626.822506] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1626.822948] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1626.823431] do_syscall_64+0x33/0x40 [ 1626.823747] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1626.824222] RIP: 0033:0x7fe8bba05b19 [ 1626.824555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1626.826186] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1626.826822] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1626.827459] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1626.828099] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1626.828714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1626.829355] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:18:09 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 72) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1626.929917] FAULT_INJECTION: forcing a failure. [ 1626.929917] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.931095] CPU: 1 PID: 8982 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1626.931674] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1626.932446] Call Trace: [ 1626.932677] dump_stack+0x107/0x167 [ 1626.932985] should_fail.cold+0x5/0xa [ 1626.933358] ? create_object.isra.0+0x3a/0xa20 [ 1626.933755] should_failslab+0x5/0x20 [ 1626.934138] kmem_cache_alloc+0x5b/0x310 [ 1626.934486] ? mark_held_locks+0x9e/0xe0 [ 1626.934828] create_object.isra.0+0x3a/0xa20 [ 1626.935247] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1626.935689] kmem_cache_alloc_trace+0x151/0x320 [ 1626.936165] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1626.936604] __list_lru_init+0x44d/0x890 [ 1626.936950] alloc_super+0x8b8/0xa90 [ 1626.937314] ? fput+0x20/0x20 [ 1626.937579] sget_fc+0x110/0x860 [ 1626.937869] ? set_anon_super+0xc0/0xc0 [ 1626.938259] ? rpc_kill_sb+0x1b0/0x1b0 [ 1626.938589] get_tree_keyed+0x55/0x210 [ 1626.938918] vfs_get_tree+0x8e/0x300 [ 1626.939280] path_mount+0x1429/0x2120 [ 1626.939609] ? strncpy_from_user+0x9e/0x470 [ 1626.939972] ? finish_automount+0xa90/0xa90 [ 1626.940423] ? getname_flags.part.0+0x1dd/0x4f0 [ 1626.940819] __x64_sys_mount+0x282/0x300 [ 1626.941210] ? copy_mnt_ns+0xa00/0xa00 [ 1626.941540] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1626.941980] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1626.942464] do_syscall_64+0x33/0x40 [ 1626.942781] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1626.943256] RIP: 0033:0x7fe8bba05b19 [ 1626.943571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1626.945217] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1626.945852] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1626.946495] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1626.947133] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1626.947722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1626.948404] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:18:22 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 54) 02:18:22 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 73) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:18:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481258, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1639.946653] FAULT_INJECTION: forcing a failure. [ 1639.946653] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.947762] CPU: 0 PID: 8992 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1639.960469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1639.960474] Call Trace: [ 1639.960494] dump_stack+0x107/0x167 [ 1639.960510] should_fail.cold+0x5/0xa [ 1639.960527] ? create_object.isra.0+0x3a/0xa20 [ 1639.960544] should_failslab+0x5/0x20 [ 1639.960558] kmem_cache_alloc+0x5b/0x310 [ 1639.960572] ? mark_held_locks+0x9e/0xe0 [ 1639.960590] create_object.isra.0+0x3a/0xa20 [ 1639.960605] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1639.960624] kmem_cache_alloc_trace+0x151/0x320 [ 1639.960645] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1639.960663] __list_lru_init+0x44d/0x890 [ 1639.960683] alloc_super+0x8b8/0xa90 [ 1639.960699] ? fput+0x20/0x20 [ 1639.960711] sget_fc+0x110/0x860 [ 1639.960724] ? set_anon_super+0xc0/0xc0 [ 1639.960738] ? rpc_kill_sb+0x1b0/0x1b0 [ 1639.960752] get_tree_keyed+0x55/0x210 [ 1639.960767] vfs_get_tree+0x8e/0x300 [ 1639.960781] path_mount+0x1429/0x2120 [ 1639.960801] ? strncpy_from_user+0x9e/0x470 [ 1639.960814] ? finish_automount+0xa90/0xa90 [ 1639.960829] ? getname_flags.part.0+0x1dd/0x4f0 [ 1639.960853] __x64_sys_mount+0x282/0x300 [ 1639.960867] ? copy_mnt_ns+0xa00/0xa00 [ 1639.960885] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1639.960900] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.960916] do_syscall_64+0x33/0x40 [ 1639.960930] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1639.960940] RIP: 0033:0x7fe8bba05b19 [ 1639.960954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.960962] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1639.960979] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1639.960987] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1639.960996] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.961004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.961013] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:18:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x40087602, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481269, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:18:22 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 50) 02:18:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:22 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d300000", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1640.047770] FAULT_INJECTION: forcing a failure. [ 1640.047770] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.049034] CPU: 0 PID: 8996 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1640.049864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1640.050712] Call Trace: [ 1640.050966] dump_stack+0x107/0x167 [ 1640.051437] should_fail.cold+0x5/0xa [ 1640.051795] ? register_for_each_vma+0x476/0xc00 [ 1640.052350] should_failslab+0x5/0x20 [ 1640.052762] kmem_cache_alloc_trace+0x55/0x320 [ 1640.053369] register_for_each_vma+0x476/0xc00 [ 1640.053846] __uprobe_register+0x4df/0x880 [ 1640.054346] probe_event_enable+0x368/0xa20 [ 1640.054780] ? uprobe_perf_close+0x5f0/0x5f0 [ 1640.055292] trace_uprobe_register+0x54/0x730 [ 1640.055709] perf_trace_event_init+0x554/0x9c0 [ 1640.056168] perf_uprobe_init+0x173/0x210 [ 1640.056686] perf_uprobe_event_init+0xff/0x1d0 [ 1640.057154] perf_try_init_event+0x130/0x570 [ 1640.057680] perf_event_alloc.part.0+0xd96/0x2b70 [ 1640.058175] __do_sys_perf_event_open+0x579/0x2e60 [ 1640.058680] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1640.059163] ? perf_event_set_output+0x5b0/0x5b0 [ 1640.059597] ? wait_for_completion_io+0x270/0x270 [ 1640.060062] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1640.060566] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1640.061030] do_syscall_64+0x33/0x40 [ 1640.061371] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1640.061832] RIP: 0033:0x7f229d85eb19 [ 1640.062172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1640.063786] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1640.064489] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1640.065128] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1640.065762] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1640.066402] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1640.067037] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:18:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:22 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d300000", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:22 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 74) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:18:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126c, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1640.200945] FAULT_INJECTION: forcing a failure. [ 1640.200945] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.202091] CPU: 0 PID: 9004 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1640.202100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1640.202105] Call Trace: [ 1640.202127] dump_stack+0x107/0x167 [ 1640.202143] should_fail.cold+0x5/0xa [ 1640.202164] ? create_object.isra.0+0x3a/0xa20 [ 1640.202188] should_failslab+0x5/0x20 [ 1640.202220] kmem_cache_alloc+0x5b/0x310 [ 1640.205470] ? mark_held_locks+0x9e/0xe0 [ 1640.205827] create_object.isra.0+0x3a/0xa20 [ 1640.206215] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1640.206665] kmem_cache_alloc_trace+0x151/0x320 [ 1640.207082] register_for_each_vma+0x476/0xc00 [ 1640.207494] __uprobe_register+0x4df/0x880 [ 1640.207889] probe_event_enable+0x368/0xa20 [ 1640.208267] ? uprobe_perf_close+0x5f0/0x5f0 [ 1640.208682] trace_uprobe_register+0x54/0x730 [ 1640.209082] perf_trace_event_init+0x554/0x9c0 [ 1640.209484] perf_uprobe_init+0x173/0x210 [ 1640.209855] perf_uprobe_event_init+0xff/0x1d0 [ 1640.210251] perf_try_init_event+0x130/0x570 [ 1640.210635] perf_event_alloc.part.0+0xd96/0x2b70 [ 1640.211062] __do_sys_perf_event_open+0x579/0x2e60 [ 1640.211497] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1640.211913] ? perf_event_set_output+0x5b0/0x5b0 [ 1640.212319] ? wait_for_completion_io+0x270/0x270 [ 1640.212777] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1640.213225] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1640.213673] do_syscall_64+0x33/0x40 [ 1640.213996] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1640.214435] RIP: 0033:0x7f08909a9b19 [ 1640.214759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1640.216320] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1640.216993] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1640.217601] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1640.218207] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1640.218821] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1640.219427] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:18:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481263, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1640.239188] FAULT_INJECTION: forcing a failure. [ 1640.239188] name failslab, interval 1, probability 0, space 0, times 0 02:18:22 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc048126f, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1640.240287] CPU: 0 PID: 9015 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1640.240984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1640.241770] Call Trace: [ 1640.242054] dump_stack+0x107/0x167 [ 1640.242407] should_fail.cold+0x5/0xa [ 1640.242746] ? create_object.isra.0+0x3a/0xa20 [ 1640.243185] should_failslab+0x5/0x20 [ 1640.243554] kmem_cache_alloc+0x5b/0x310 [ 1640.243912] ? mark_held_locks+0x9e/0xe0 [ 1640.244264] create_object.isra.0+0x3a/0xa20 [ 1640.244680] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1640.245129] kmem_cache_alloc_trace+0x151/0x320 [ 1640.245551] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1640.246001] __list_lru_init+0x44d/0x890 [ 1640.246357] alloc_super+0x8b8/0xa90 [ 1640.246677] ? fput+0x20/0x20 [ 1640.246951] sget_fc+0x110/0x860 [ 1640.247276] ? set_anon_super+0xc0/0xc0 [ 1640.247655] ? rpc_kill_sb+0x1b0/0x1b0 [ 1640.248029] get_tree_keyed+0x55/0x210 [ 1640.248410] vfs_get_tree+0x8e/0x300 [ 1640.248736] path_mount+0x1429/0x2120 [ 1640.249078] ? strncpy_from_user+0x9e/0x470 [ 1640.249452] ? finish_automount+0xa90/0xa90 [ 1640.249828] ? getname_flags.part.0+0x1dd/0x4f0 [ 1640.250241] __x64_sys_mount+0x282/0x300 [ 1640.250595] ? copy_mnt_ns+0xa00/0xa00 [ 1640.250943] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1640.251412] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1640.251888] do_syscall_64+0x33/0x40 [ 1640.252244] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1640.252737] RIP: 0033:0x7fe8bba05b19 [ 1640.253093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1640.254793] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1640.255500] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1640.256168] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1640.256827] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1640.257498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1640.258154] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:18:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:22 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d300000", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:22 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 55) 02:18:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5386, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:22 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 75) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:18:22 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481264, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1640.450822] FAULT_INJECTION: forcing a failure. [ 1640.450822] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.451807] CPU: 1 PID: 9038 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1640.452354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1640.453046] Call Trace: [ 1640.453276] dump_stack+0x107/0x167 [ 1640.453583] should_fail.cold+0x5/0xa [ 1640.453602] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1640.453621] should_failslab+0x5/0x20 [ 1640.453638] kmem_cache_alloc_trace+0x55/0x320 [ 1640.453652] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1640.453667] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1640.453682] __list_lru_init+0x44d/0x890 [ 1640.453698] alloc_super+0x8b8/0xa90 [ 1640.453711] ? fput+0x20/0x20 [ 1640.453720] sget_fc+0x110/0x860 [ 1640.453731] ? set_anon_super+0xc0/0xc0 [ 1640.453743] ? rpc_kill_sb+0x1b0/0x1b0 [ 1640.453756] get_tree_keyed+0x55/0x210 [ 1640.453768] vfs_get_tree+0x8e/0x300 [ 1640.453780] path_mount+0x1429/0x2120 [ 1640.453800] ? strncpy_from_user+0x9e/0x470 [ 1640.453811] ? finish_automount+0xa90/0xa90 [ 1640.453824] ? getname_flags.part.0+0x1dd/0x4f0 [ 1640.453842] __x64_sys_mount+0x282/0x300 [ 1640.453852] ? copy_mnt_ns+0xa00/0xa00 [ 1640.453872] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1640.453888] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1640.453901] do_syscall_64+0x33/0x40 [ 1640.453913] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1640.453922] RIP: 0033:0x7fe8bba05b19 [ 1640.453933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1640.453940] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1640.453954] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1640.453961] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1640.453968] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1640.453975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1640.453982] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1640.497444] FAULT_INJECTION: forcing a failure. [ 1640.497444] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.498460] CPU: 1 PID: 9043 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1640.499007] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1640.499677] Call Trace: [ 1640.499896] dump_stack+0x107/0x167 [ 1640.500201] should_fail.cold+0x5/0xa [ 1640.500546] ? register_for_each_vma+0x476/0xc00 [ 1640.500937] should_failslab+0x5/0x20 [ 1640.501253] kmem_cache_alloc_trace+0x55/0x320 [ 1640.501633] register_for_each_vma+0x476/0xc00 [ 1640.502019] __uprobe_register+0x4df/0x880 [ 1640.502389] probe_event_enable+0x368/0xa20 [ 1640.502747] ? uprobe_perf_close+0x5f0/0x5f0 [ 1640.503117] trace_uprobe_register+0x54/0x730 [ 1640.503498] perf_trace_event_init+0x554/0x9c0 [ 1640.503879] perf_uprobe_init+0x173/0x210 [ 1640.504231] perf_uprobe_event_init+0xff/0x1d0 [ 1640.504619] perf_try_init_event+0x130/0x570 [ 1640.504982] perf_event_alloc.part.0+0xd96/0x2b70 [ 1640.505386] __do_sys_perf_event_open+0x579/0x2e60 [ 1640.505800] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1640.506194] ? perf_event_set_output+0x5b0/0x5b0 [ 1640.506582] ? wait_for_completion_io+0x270/0x270 [ 1640.506995] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1640.507423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1640.507846] do_syscall_64+0x33/0x40 [ 1640.508152] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1640.508584] RIP: 0033:0x7f229d85eb19 [ 1640.508889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1640.510367] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1640.510986] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1640.511566] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1640.512142] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1640.512731] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1640.513309] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1653.489727] FAULT_INJECTION: forcing a failure. [ 1653.489727] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.491194] CPU: 0 PID: 9063 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1653.491807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1653.492604] Call Trace: [ 1653.492857] dump_stack+0x107/0x167 [ 1653.493269] should_fail.cold+0x5/0xa [ 1653.493627] ? create_object.isra.0+0x3a/0xa20 [ 1653.494172] should_failslab+0x5/0x20 [ 1653.494530] kmem_cache_alloc+0x5b/0x310 [ 1653.494893] ? mark_held_locks+0x9e/0xe0 [ 1653.495285] create_object.isra.0+0x3a/0xa20 [ 1653.495655] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1653.496132] kmem_cache_alloc_trace+0x151/0x320 [ 1653.496541] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1653.496954] __list_lru_init+0x44d/0x890 [ 1653.497373] alloc_super+0x8b8/0xa90 [ 1653.497686] ? fput+0x20/0x20 [ 1653.497948] sget_fc+0x110/0x860 [ 1653.498282] ? set_anon_super+0xc0/0xc0 [ 1653.498616] ? rpc_kill_sb+0x1b0/0x1b0 [ 1653.498942] get_tree_keyed+0x55/0x210 [ 1653.499317] vfs_get_tree+0x8e/0x300 [ 1653.499628] path_mount+0x1429/0x2120 [ 1653.499954] ? strncpy_from_user+0x9e/0x470 [ 1653.500368] ? finish_automount+0xa90/0xa90 [ 1653.500739] ? getname_flags.part.0+0x1dd/0x4f0 [ 1653.501202] __x64_sys_mount+0x282/0x300 [ 1653.501546] ? copy_mnt_ns+0xa00/0xa00 [ 1653.501874] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1653.502362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1653.502792] do_syscall_64+0x33/0x40 [ 1653.503151] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1653.503581] RIP: 0033:0x7fe8bba05b19 [ 1653.503898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.505602] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1653.506282] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1653.506868] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1653.507501] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 02:18:35 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 56) 02:18:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5386, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:35 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481270, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:18:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:35 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 76) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:18:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481269, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:35 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 51) [ 1653.508136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1653.508740] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1653.523731] FAULT_INJECTION: forcing a failure. [ 1653.523731] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.524893] CPU: 0 PID: 9053 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1653.525583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1653.526354] Call Trace: [ 1653.526579] dump_stack+0x107/0x167 [ 1653.527049] should_fail.cold+0x5/0xa [ 1653.527416] ? create_object.isra.0+0x3a/0xa20 [ 1653.527845] should_failslab+0x5/0x20 [ 1653.528250] kmem_cache_alloc+0x5b/0x310 [ 1653.528637] ? mark_held_locks+0x9e/0xe0 [ 1653.529100] create_object.isra.0+0x3a/0xa20 [ 1653.533399] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1653.533936] kmem_cache_alloc_trace+0x151/0x320 [ 1653.534430] register_for_each_vma+0x476/0xc00 [ 1653.534921] __uprobe_register+0x4df/0x880 [ 1653.535376] probe_event_enable+0x368/0xa20 [ 1653.535838] ? uprobe_perf_close+0x5f0/0x5f0 [ 1653.536307] trace_uprobe_register+0x54/0x730 [ 1653.537112] perf_trace_event_init+0x554/0x9c0 [ 1653.537535] perf_uprobe_init+0x173/0x210 [ 1653.538275] perf_uprobe_event_init+0xff/0x1d0 [ 1653.538696] perf_try_init_event+0x130/0x570 [ 1653.539155] perf_event_alloc.part.0+0xd96/0x2b70 [ 1653.539622] __do_sys_perf_event_open+0x579/0x2e60 [ 1653.543417] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1653.543877] ? perf_event_set_output+0x5b0/0x5b0 [ 1653.544537] ? wait_for_completion_io+0x270/0x270 [ 1653.545091] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1653.545627] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1653.546149] do_syscall_64+0x33/0x40 [ 1653.546530] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1653.546960] RIP: 0033:0x7f229d85eb19 [ 1653.547393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.549224] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1653.549856] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1653.550519] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1653.551253] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1653.551896] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1653.552561] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:18:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481275, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:18:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x5386, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:35 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde10800000024010040", @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:35 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 77) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1653.699776] FAULT_INJECTION: forcing a failure. [ 1653.699776] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.700927] CPU: 0 PID: 9079 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1653.701545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1653.702282] Call Trace: [ 1653.702403] FAULT_INJECTION: forcing a failure. [ 1653.702403] name failslab, interval 1, probability 0, space 0, times 0 [ 1653.702527] dump_stack+0x107/0x167 [ 1653.703740] should_fail.cold+0x5/0xa [ 1653.704071] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1653.704535] should_failslab+0x5/0x20 [ 1653.704868] kmem_cache_alloc_trace+0x55/0x320 [ 1653.705262] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1653.705694] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1653.706112] __list_lru_init+0x44d/0x890 [ 1653.706467] alloc_super+0x8b8/0xa90 [ 1653.706786] ? fput+0x20/0x20 [ 1653.707053] sget_fc+0x110/0x860 [ 1653.707347] ? set_anon_super+0xc0/0xc0 [ 1653.707687] ? rpc_kill_sb+0x1b0/0x1b0 [ 1653.708019] get_tree_keyed+0x55/0x210 [ 1653.708356] vfs_get_tree+0x8e/0x300 [ 1653.708695] path_mount+0x1429/0x2120 [ 1653.709037] ? strncpy_from_user+0x9e/0x470 [ 1653.709419] ? finish_automount+0xa90/0xa90 [ 1653.709811] ? getname_flags.part.0+0x1dd/0x4f0 [ 1653.710229] __x64_sys_mount+0x282/0x300 [ 1653.710587] ? copy_mnt_ns+0xa00/0xa00 [ 1653.710931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1653.711384] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1653.711823] do_syscall_64+0x33/0x40 [ 1653.712143] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1653.712596] RIP: 0033:0x7fe8bba05b19 [ 1653.712914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.714444] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1653.715082] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1653.715680] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1653.716280] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1653.716894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1653.717556] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1653.718170] CPU: 1 PID: 9066 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1653.718791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1653.719544] Call Trace: [ 1653.719791] dump_stack+0x107/0x167 [ 1653.720121] should_fail.cold+0x5/0xa [ 1653.720489] ? register_for_each_vma+0x476/0xc00 [ 1653.720935] should_failslab+0x5/0x20 [ 1653.721284] kmem_cache_alloc_trace+0x55/0x320 [ 1653.721716] register_for_each_vma+0x476/0xc00 [ 1653.722156] __uprobe_register+0x4df/0x880 [ 1653.722576] probe_event_enable+0x368/0xa20 [ 1653.722976] ? uprobe_perf_close+0x5f0/0x5f0 [ 1653.723383] trace_uprobe_register+0x54/0x730 [ 1653.723803] perf_trace_event_init+0x554/0x9c0 [ 1653.724231] perf_uprobe_init+0x173/0x210 [ 1653.724629] perf_uprobe_event_init+0xff/0x1d0 [ 1653.725036] perf_try_init_event+0x130/0x570 [ 1653.725430] perf_event_alloc.part.0+0xd96/0x2b70 [ 1653.725866] __do_sys_perf_event_open+0x579/0x2e60 [ 1653.726311] ? finish_task_switch+0x126/0x5d0 [ 1653.726725] ? __switch_to_asm+0x3a/0x60 [ 1653.727117] ? perf_event_set_output+0x5b0/0x5b0 [ 1653.727582] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1653.728069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1653.728557] do_syscall_64+0x33/0x40 [ 1653.728903] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1653.729380] RIP: 0033:0x7f08909a9b19 [ 1653.729722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1653.731351] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1653.732043] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1653.732704] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1653.733345] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1653.733980] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1653.734618] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:18:36 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc048126c, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x0, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:36 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:49 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 57) 02:18:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:49 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 52) 02:18:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:18:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481278, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:18:49 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 78) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:18:49 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:18:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc048126f, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1667.363614] FAULT_INJECTION: forcing a failure. [ 1667.363614] name failslab, interval 1, probability 0, space 0, times 0 [ 1667.365544] CPU: 1 PID: 9109 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1667.367023] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1667.368851] Call Trace: [ 1667.369426] dump_stack+0x107/0x167 [ 1667.370214] should_fail.cold+0x5/0xa [ 1667.371043] ? create_object.isra.0+0x3a/0xa20 [ 1667.372044] should_failslab+0x5/0x20 [ 1667.372894] kmem_cache_alloc+0x5b/0x310 [ 1667.373789] ? mark_held_locks+0x9e/0xe0 [ 1667.374672] create_object.isra.0+0x3a/0xa20 [ 1667.375642] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1667.376764] kmem_cache_alloc_trace+0x151/0x320 [ 1667.377785] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1667.378862] __list_lru_init+0x44d/0x890 [ 1667.379762] alloc_super+0x8b8/0xa90 [ 1667.380569] ? fput+0x20/0x20 [ 1667.381257] sget_fc+0x110/0x860 [ 1667.381988] ? set_anon_super+0xc0/0xc0 [ 1667.382854] ? rpc_kill_sb+0x1b0/0x1b0 [ 1667.383698] get_tree_keyed+0x55/0x210 [ 1667.384544] vfs_get_tree+0x8e/0x300 [ 1667.385362] path_mount+0x1429/0x2120 [ 1667.386196] ? strncpy_from_user+0x9e/0x470 [ 1667.387132] ? finish_automount+0xa90/0xa90 [ 1667.388081] ? getname_flags.part.0+0x1dd/0x4f0 [ 1667.389104] __x64_sys_mount+0x282/0x300 [ 1667.389985] ? copy_mnt_ns+0xa00/0xa00 [ 1667.390834] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1667.391986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1667.393118] do_syscall_64+0x33/0x40 [ 1667.393932] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1667.395050] RIP: 0033:0x7fe8bba05b19 [ 1667.395857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1667.401987] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1667.402700] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1667.403370] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1667.404013] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1667.404697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1667.405363] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:18:49 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1667.414264] FAULT_INJECTION: forcing a failure. [ 1667.414264] name failslab, interval 1, probability 0, space 0, times 0 [ 1667.415536] CPU: 0 PID: 9102 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1667.416308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1667.417179] Call Trace: [ 1667.417471] dump_stack+0x107/0x167 [ 1667.417914] should_fail.cold+0x5/0xa [ 1667.418330] ? create_object.isra.0+0x3a/0xa20 [ 1667.418901] should_failslab+0x5/0x20 [ 1667.419314] kmem_cache_alloc+0x5b/0x310 [ 1667.419802] ? mark_held_locks+0x9e/0xe0 [ 1667.420241] create_object.isra.0+0x3a/0xa20 [ 1667.420766] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1667.421313] kmem_cache_alloc_trace+0x151/0x320 [ 1667.421872] register_for_each_vma+0x476/0xc00 [ 1667.422374] __uprobe_register+0x4df/0x880 [ 1667.422920] probe_event_enable+0x368/0xa20 [ 1667.423382] ? uprobe_perf_close+0x5f0/0x5f0 [ 1667.423911] trace_uprobe_register+0x54/0x730 [ 1667.424393] perf_trace_event_init+0x554/0x9c0 [ 1667.424897] perf_uprobe_init+0x173/0x210 [ 1667.425260] perf_uprobe_event_init+0xff/0x1d0 [ 1667.425692] perf_try_init_event+0x130/0x570 [ 1667.426186] perf_event_alloc.part.0+0xd96/0x2b70 [ 1667.426607] __do_sys_perf_event_open+0x579/0x2e60 [ 1667.427109] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1667.427520] ? perf_event_set_output+0x5b0/0x5b0 [ 1667.427976] ? wait_for_completion_io+0x270/0x270 [ 1667.428404] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1667.428945] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1667.429454] do_syscall_64+0x33/0x40 [ 1667.429878] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1667.430378] RIP: 0033:0x7f08909a9b19 [ 1667.430821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1667.432742] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1667.433506] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1667.434269] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1667.435068] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1667.435800] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1667.436473] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:18:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x402, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:18:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481270, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:18:49 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 79) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1667.543061] FAULT_INJECTION: forcing a failure. [ 1667.543061] name failslab, interval 1, probability 0, space 0, times 0 [ 1667.545588] CPU: 0 PID: 9122 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1667.547242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1667.549171] Call Trace: [ 1667.549858] dump_stack+0x107/0x167 [ 1667.550777] should_fail.cold+0x5/0xa [ 1667.551751] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1667.552980] should_failslab+0x5/0x20 [ 1667.553888] kmem_cache_alloc_trace+0x55/0x320 [ 1667.555062] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1667.556284] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1667.557439] __list_lru_init+0x44d/0x890 [ 1667.558392] alloc_super+0x8b8/0xa90 [ 1667.559264] ? fput+0x20/0x20 [ 1667.560000] sget_fc+0x110/0x860 [ 1667.560827] ? set_anon_super+0xc0/0xc0 [ 1667.561763] ? rpc_kill_sb+0x1b0/0x1b0 [ 1667.562677] get_tree_keyed+0x55/0x210 [ 1667.563594] vfs_get_tree+0x8e/0x300 [ 1667.564466] path_mount+0x1429/0x2120 [ 1667.565376] ? strncpy_from_user+0x9e/0x470 [ 1667.566387] ? finish_automount+0xa90/0xa90 [ 1667.567407] ? getname_flags.part.0+0x1dd/0x4f0 [ 1667.568507] __x64_sys_mount+0x282/0x300 [ 1667.569460] ? copy_mnt_ns+0xa00/0xa00 [ 1667.570551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1667.571786] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1667.573005] do_syscall_64+0x33/0x40 [ 1667.573882] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1667.575088] RIP: 0033:0x7fe8bba05b19 [ 1667.575961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1667.580338] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1667.582123] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1667.583794] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1667.585472] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1667.587156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1667.588839] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1667.594504] FAULT_INJECTION: forcing a failure. [ 1667.594504] name failslab, interval 1, probability 0, space 0, times 0 [ 1667.597193] CPU: 0 PID: 9113 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1667.598809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1667.600760] Call Trace: [ 1667.601375] dump_stack+0x107/0x167 [ 1667.602234] should_fail.cold+0x5/0xa [ 1667.603139] ? register_for_each_vma+0x476/0xc00 [ 1667.604256] should_failslab+0x5/0x20 [ 1667.605167] kmem_cache_alloc_trace+0x55/0x320 [ 1667.606250] register_for_each_vma+0x476/0xc00 [ 1667.607344] __uprobe_register+0x4df/0x880 [ 1667.608362] probe_event_enable+0x368/0xa20 [ 1667.609390] ? uprobe_perf_close+0x5f0/0x5f0 [ 1667.610560] trace_uprobe_register+0x54/0x730 [ 1667.611623] perf_trace_event_init+0x554/0x9c0 [ 1667.612717] perf_uprobe_init+0x173/0x210 [ 1667.613696] perf_uprobe_event_init+0xff/0x1d0 [ 1667.614768] perf_try_init_event+0x130/0x570 [ 1667.615806] perf_event_alloc.part.0+0xd96/0x2b70 [ 1667.616950] __do_sys_perf_event_open+0x579/0x2e60 [ 1667.618112] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1667.619256] ? perf_event_set_output+0x5b0/0x5b0 [ 1667.620366] ? wait_for_completion_io+0x270/0x270 [ 1667.621517] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1667.623014] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1667.624237] do_syscall_64+0x33/0x40 [ 1667.625123] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1667.626331] RIP: 0033:0x7f229d85eb19 [ 1667.627198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1667.631547] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1667.633406] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1667.635074] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1667.636762] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1667.638445] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1667.640123] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:19:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:19:03 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 58) 02:19:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481275, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:19:03 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 80) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:19:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:19:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x403, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:19:03 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 53) [ 1680.935537] FAULT_INJECTION: forcing a failure. [ 1680.935537] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.936588] CPU: 1 PID: 9143 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1680.937225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.937962] Call Trace: [ 1680.938212] dump_stack+0x107/0x167 [ 1680.938546] should_fail.cold+0x5/0xa [ 1680.938896] ? create_object.isra.0+0x3a/0xa20 [ 1680.939314] should_failslab+0x5/0x20 [ 1680.939668] kmem_cache_alloc+0x5b/0x310 [ 1680.940043] ? mark_held_locks+0x9e/0xe0 [ 1680.940418] create_object.isra.0+0x3a/0xa20 [ 1680.940838] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1680.941277] kmem_cache_alloc_trace+0x151/0x320 [ 1680.941677] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1680.942092] __list_lru_init+0x44d/0x890 [ 1680.942447] alloc_super+0x8b8/0xa90 [ 1680.942764] ? fput+0x20/0x20 [ 1680.943029] sget_fc+0x110/0x860 [ 1680.943320] ? set_anon_super+0xc0/0xc0 [ 1680.943656] ? rpc_kill_sb+0x1b0/0x1b0 [ 1680.943984] get_tree_keyed+0x55/0x210 [ 1680.944318] vfs_get_tree+0x8e/0x300 [ 1680.944632] path_mount+0x1429/0x2120 [ 1680.944988] ? strncpy_from_user+0x9e/0x470 [ 1680.945356] ? finish_automount+0xa90/0xa90 [ 1680.945719] ? getname_flags.part.0+0x1dd/0x4f0 [ 1680.946115] __x64_sys_mount+0x282/0x300 [ 1680.946461] ? copy_mnt_ns+0xa00/0xa00 [ 1680.946793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.947249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.947687] do_syscall_64+0x33/0x40 [ 1680.948001] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.948446] RIP: 0033:0x7fe8bba05b19 [ 1680.948801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.950345] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1680.950979] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1680.951574] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1680.952162] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.952766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1680.953365] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1680.975875] FAULT_INJECTION: forcing a failure. 02:19:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481278, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1680.975875] name failslab, interval 1, probability 0, space 0, times 0 [ 1680.976964] CPU: 1 PID: 9149 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1680.977584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.978317] Call Trace: [ 1680.978570] dump_stack+0x107/0x167 [ 1680.978913] should_fail.cold+0x5/0xa [ 1680.979273] ? create_object.isra.0+0x3a/0xa20 [ 1680.979696] should_failslab+0x5/0x20 [ 1680.980064] kmem_cache_alloc+0x5b/0x310 [ 1680.980449] ? mark_held_locks+0x9e/0xe0 [ 1680.981027] create_object.isra.0+0x3a/0xa20 [ 1680.981864] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1680.982822] kmem_cache_alloc_trace+0x151/0x320 [ 1680.983699] register_for_each_vma+0x476/0xc00 [ 1680.984586] __uprobe_register+0x4df/0x880 [ 1680.985099] probe_event_enable+0x368/0xa20 [ 1680.985507] ? uprobe_perf_close+0x5f0/0x5f0 [ 1680.985918] trace_uprobe_register+0x54/0x730 [ 1680.986337] perf_trace_event_init+0x554/0x9c0 [ 1680.986764] perf_uprobe_init+0x173/0x210 [ 1680.987160] perf_uprobe_event_init+0xff/0x1d0 [ 1680.987584] perf_try_init_event+0x130/0x570 [ 1680.987996] perf_event_alloc.part.0+0xd96/0x2b70 [ 1680.988457] __do_sys_perf_event_open+0x579/0x2e60 [ 1680.988985] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1680.989425] ? perf_event_set_output+0x5b0/0x5b0 [ 1680.989861] ? wait_for_completion_io+0x270/0x270 [ 1680.990339] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.990818] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.991295] do_syscall_64+0x33/0x40 [ 1680.991636] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1680.992090] RIP: 0033:0x7f229d85eb19 [ 1680.992428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.994075] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1680.994774] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1680.995412] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1680.996065] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.996703] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1680.997377] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:19:03 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:03 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 81) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:19:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1681.030243] blktrace: Concurrent blktraces are not allowed on sg0 [ 1681.031572] blktrace: Concurrent blktraces are not allowed on sg0 02:19:03 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x404, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1681.097815] FAULT_INJECTION: forcing a failure. [ 1681.097815] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.098952] CPU: 0 PID: 9161 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1681.099496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1681.100135] Call Trace: [ 1681.100354] dump_stack+0x107/0x167 [ 1681.100645] should_fail.cold+0x5/0xa [ 1681.100966] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1681.101373] should_failslab+0x5/0x20 [ 1681.101680] kmem_cache_alloc_trace+0x55/0x320 [ 1681.102043] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1681.102448] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1681.102840] __list_lru_init+0x44d/0x890 [ 1681.103167] alloc_super+0x8b8/0xa90 [ 1681.103468] ? fput+0x20/0x20 [ 1681.103717] sget_fc+0x110/0x860 [ 1681.103988] ? set_anon_super+0xc0/0xc0 [ 1681.104308] ? rpc_kill_sb+0x1b0/0x1b0 [ 1681.104618] get_tree_keyed+0x55/0x210 [ 1681.104939] vfs_get_tree+0x8e/0x300 [ 1681.105238] path_mount+0x1429/0x2120 [ 1681.105549] ? strncpy_from_user+0x9e/0x470 [ 1681.105891] ? finish_automount+0xa90/0xa90 [ 1681.106235] ? getname_flags.part.0+0x1dd/0x4f0 [ 1681.106612] __x64_sys_mount+0x282/0x300 [ 1681.106933] ? copy_mnt_ns+0xa00/0xa00 [ 1681.107252] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1681.107669] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1681.108078] do_syscall_64+0x33/0x40 [ 1681.108378] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1681.108791] RIP: 0033:0x7fe8bba05b19 [ 1681.109094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1681.110518] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1681.111116] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1681.111673] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1681.112231] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.112830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1681.113388] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1681.145797] FAULT_INJECTION: forcing a failure. [ 1681.145797] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.147016] CPU: 1 PID: 9146 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1681.147742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1681.148588] Call Trace: [ 1681.148886] dump_stack+0x107/0x167 [ 1681.149267] should_fail.cold+0x5/0xa [ 1681.149676] ? register_for_each_vma+0x476/0xc00 [ 1681.150173] should_failslab+0x5/0x20 [ 1681.150579] kmem_cache_alloc_trace+0x55/0x320 [ 1681.151068] register_for_each_vma+0x476/0xc00 [ 1681.151582] __uprobe_register+0x4df/0x880 [ 1681.152046] probe_event_enable+0x368/0xa20 [ 1681.152500] ? uprobe_perf_close+0x5f0/0x5f0 [ 1681.152988] trace_uprobe_register+0x54/0x730 [ 1681.153473] perf_trace_event_init+0x554/0x9c0 [ 1681.153976] perf_uprobe_init+0x173/0x210 [ 1681.154429] perf_uprobe_event_init+0xff/0x1d0 [ 1681.154926] perf_try_init_event+0x130/0x570 [ 1681.155390] perf_event_alloc.part.0+0xd96/0x2b70 [ 1681.155911] __do_sys_perf_event_open+0x579/0x2e60 [ 1681.156443] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1681.156972] ? perf_event_set_output+0x5b0/0x5b0 [ 1681.157418] ? wait_for_completion_io+0x270/0x270 [ 1681.157886] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1681.158380] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1681.158860] do_syscall_64+0x33/0x40 [ 1681.159222] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1681.159690] RIP: 0033:0x7f08909a9b19 [ 1681.160034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1681.163017] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1681.164940] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1681.166689] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1681.168481] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.170242] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1681.171967] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:19:16 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 54) 02:19:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x407, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:19:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1693.929001] blktrace: Concurrent blktraces are not allowed on sg0 02:19:16 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 59) 02:19:16 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:16 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 82) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:19:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x45, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:19:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) [ 1693.972155] FAULT_INJECTION: forcing a failure. [ 1693.972155] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.973409] CPU: 1 PID: 9187 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1693.974154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1693.975055] Call Trace: [ 1693.975358] dump_stack+0x107/0x167 [ 1693.975740] should_fail.cold+0x5/0xa [ 1693.976149] ? create_object.isra.0+0x3a/0xa20 [ 1693.976644] should_failslab+0x5/0x20 [ 1693.977049] kmem_cache_alloc+0x5b/0x310 [ 1693.977448] ? mark_held_locks+0x9e/0xe0 [ 1693.977841] create_object.isra.0+0x3a/0xa20 [ 1693.978286] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1693.978798] kmem_cache_alloc_trace+0x151/0x320 [ 1693.979262] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1693.979754] __list_lru_init+0x44d/0x890 [ 1693.980155] alloc_super+0x8b8/0xa90 [ 1693.980521] ? fput+0x20/0x20 [ 1693.980821] sget_fc+0x110/0x860 [ 1693.981170] ? set_anon_super+0xc0/0xc0 [ 1693.981563] ? rpc_kill_sb+0x1b0/0x1b0 [ 1693.981927] get_tree_keyed+0x55/0x210 [ 1693.982299] vfs_get_tree+0x8e/0x300 [ 1693.982657] path_mount+0x1429/0x2120 [ 1693.983030] ? strncpy_from_user+0x9e/0x470 [ 1693.984055] ? finish_automount+0xa90/0xa90 [ 1693.984494] ? getname_flags.part.0+0x1dd/0x4f0 [ 1693.985562] __x64_sys_mount+0x282/0x300 [ 1693.985973] ? copy_mnt_ns+0xa00/0xa00 [ 1693.986849] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1693.987370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1693.987870] do_syscall_64+0x33/0x40 [ 1693.988236] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1693.988732] RIP: 0033:0x7fe8bba05b19 [ 1693.989098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1693.990877] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1693.991629] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1693.992316] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1693.992994] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.993681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1693.994368] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1693.995589] FAULT_INJECTION: forcing a failure. [ 1693.995589] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.996816] CPU: 0 PID: 9183 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1693.997480] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1694.005111] Call Trace: [ 1694.005745] dump_stack+0x107/0x167 [ 1694.006093] should_fail.cold+0x5/0xa [ 1694.006468] ? register_for_each_vma+0x476/0xc00 [ 1694.006926] should_failslab+0x5/0x20 [ 1694.007312] kmem_cache_alloc_trace+0x55/0x320 [ 1694.008380] register_for_each_vma+0x476/0xc00 [ 1694.008853] __uprobe_register+0x4df/0x880 [ 1694.009366] probe_event_enable+0x368/0xa20 [ 1694.010145] ? uprobe_perf_close+0x5f0/0x5f0 [ 1694.010959] trace_uprobe_register+0x54/0x730 [ 1694.011420] perf_trace_event_init+0x554/0x9c0 [ 1694.012058] perf_uprobe_init+0x173/0x210 [ 1694.012473] perf_uprobe_event_init+0xff/0x1d0 [ 1694.012933] perf_try_init_event+0x130/0x570 [ 1694.013668] perf_event_alloc.part.0+0xd96/0x2b70 [ 1694.014149] __do_sys_perf_event_open+0x579/0x2e60 [ 1694.014636] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1694.015108] ? perf_event_set_output+0x5b0/0x5b0 [ 1694.015562] ? wait_for_completion_io+0x270/0x270 [ 1694.016036] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1694.020918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1694.021403] do_syscall_64+0x33/0x40 [ 1694.021760] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1694.022240] RIP: 0033:0x7f229d85eb19 [ 1694.022584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.040915] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1694.041638] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1694.048964] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1694.049634] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.050291] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1694.050962] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:19:16 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde1080000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1694.090421] FAULT_INJECTION: forcing a failure. [ 1694.090421] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.091446] CPU: 1 PID: 9175 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1694.092055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1694.092791] Call Trace: [ 1694.093049] dump_stack+0x107/0x167 [ 1694.093417] should_fail.cold+0x5/0xa [ 1694.093789] ? create_object.isra.0+0x3a/0xa20 [ 1694.094251] should_failslab+0x5/0x20 [ 1694.094633] kmem_cache_alloc+0x5b/0x310 [ 1694.095028] ? mark_held_locks+0x9e/0xe0 [ 1694.095420] create_object.isra.0+0x3a/0xa20 [ 1694.095845] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1694.096347] kmem_cache_alloc_trace+0x151/0x320 [ 1694.096826] register_for_each_vma+0x476/0xc00 [ 1694.097312] __uprobe_register+0x4df/0x880 [ 1694.097758] probe_event_enable+0x368/0xa20 [ 1694.098183] ? uprobe_perf_close+0x5f0/0x5f0 [ 1694.098614] trace_uprobe_register+0x54/0x730 [ 1694.099073] perf_trace_event_init+0x554/0x9c0 [ 1694.099527] perf_uprobe_init+0x173/0x210 [ 1694.099951] perf_uprobe_event_init+0xff/0x1d0 [ 1694.100405] perf_try_init_event+0x130/0x570 [ 1694.100851] perf_event_alloc.part.0+0xd96/0x2b70 [ 1694.101325] __do_sys_perf_event_open+0x579/0x2e60 [ 1694.101787] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1694.102232] ? perf_event_set_output+0x5b0/0x5b0 [ 1694.102679] ? wait_for_completion_io+0x270/0x270 [ 1694.103146] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1694.103620] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1694.104071] do_syscall_64+0x33/0x40 [ 1694.104394] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1694.104836] RIP: 0033:0x7f08909a9b19 [ 1694.105158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.106852] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1694.107576] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1694.108253] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1694.108948] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.109613] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1694.110282] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1694.120479] blktrace: Concurrent blktraces are not allowed on sg0 [ 1694.121170] blktrace: Concurrent blktraces are not allowed on sg0 02:19:16 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 83) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:19:16 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde1080000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x414, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) [ 1694.177014] FAULT_INJECTION: forcing a failure. [ 1694.177014] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.178113] CPU: 1 PID: 9201 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1694.178777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1694.179571] Call Trace: [ 1694.179828] dump_stack+0x107/0x167 [ 1694.180184] should_fail.cold+0x5/0xa [ 1694.180563] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1694.181065] should_failslab+0x5/0x20 [ 1694.181450] kmem_cache_alloc_trace+0x55/0x320 [ 1694.181914] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1694.182420] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1694.182916] __list_lru_init+0x44d/0x890 [ 1694.183322] alloc_super+0x8b8/0xa90 [ 1694.183691] ? fput+0x20/0x20 [ 1694.183998] sget_fc+0x110/0x860 [ 1694.184293] ? set_anon_super+0xc0/0xc0 [ 1694.184636] ? rpc_kill_sb+0x1b0/0x1b0 [ 1694.184979] get_tree_keyed+0x55/0x210 [ 1694.185317] vfs_get_tree+0x8e/0x300 [ 1694.185640] path_mount+0x1429/0x2120 [ 1694.185985] ? strncpy_from_user+0x9e/0x470 [ 1694.186357] ? finish_automount+0xa90/0xa90 [ 1694.186732] ? getname_flags.part.0+0x1dd/0x4f0 [ 1694.187142] __x64_sys_mount+0x282/0x300 [ 1694.187522] ? copy_mnt_ns+0xa00/0xa00 [ 1694.187922] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1694.188430] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1694.188891] do_syscall_64+0x33/0x40 [ 1694.189270] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1694.189795] RIP: 0033:0x7fe8bba05b19 [ 1694.190177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1694.191956] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1694.192705] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1694.193348] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1694.193987] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.194628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1694.195274] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:19:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x42f, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:19:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1694.219740] blktrace: Concurrent blktraces are not allowed on sg0 [ 1694.220780] blktrace: Concurrent blktraces are not allowed on sg0 02:19:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) 02:19:29 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 55) 02:19:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) socket$inet6_udplite(0xa, 0x2, 0x88) 02:19:29 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde1080000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:29 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 60) 02:19:29 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x45f, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:19:29 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 84) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:19:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x445, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() [ 1707.211348] FAULT_INJECTION: forcing a failure. [ 1707.211348] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.212565] CPU: 1 PID: 9224 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1707.213255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.214084] Call Trace: [ 1707.214362] dump_stack+0x107/0x167 [ 1707.214720] should_fail.cold+0x5/0xa [ 1707.215109] ? create_object.isra.0+0x3a/0xa20 [ 1707.215582] should_failslab+0x5/0x20 [ 1707.215975] kmem_cache_alloc+0x5b/0x310 [ 1707.216396] ? mark_held_locks+0x9e/0xe0 [ 1707.216805] create_object.isra.0+0x3a/0xa20 [ 1707.217249] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1707.217788] kmem_cache_alloc_trace+0x151/0x320 [ 1707.218278] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1707.218767] __list_lru_init+0x44d/0x890 [ 1707.219189] alloc_super+0x8b8/0xa90 [ 1707.219569] ? fput+0x20/0x20 [ 1707.219878] sget_fc+0x110/0x860 [ 1707.220225] ? set_anon_super+0xc0/0xc0 [ 1707.220635] ? rpc_kill_sb+0x1b0/0x1b0 [ 1707.221035] get_tree_keyed+0x55/0x210 [ 1707.221434] vfs_get_tree+0x8e/0x300 [ 1707.222023] path_mount+0x1429/0x2120 [ 1707.222675] ? strncpy_from_user+0x9e/0x470 [ 1707.223406] ? finish_automount+0xa90/0xa90 [ 1707.224136] ? getname_flags.part.0+0x1dd/0x4f0 [ 1707.225110] __x64_sys_mount+0x282/0x300 [ 1707.225798] ? copy_mnt_ns+0xa00/0xa00 [ 1707.226461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1707.227357] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1707.228243] do_syscall_64+0x33/0x40 [ 1707.228875] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.229979] RIP: 0033:0x7fe8bba05b19 [ 1707.230612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.233361] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1707.234004] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1707.234603] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1707.235199] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.235798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1707.236396] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1707.243303] blktrace: Concurrent blktraces are not allowed on sg0 [ 1707.245514] blktrace: Concurrent blktraces are not allowed on sg0 [ 1707.249998] FAULT_INJECTION: forcing a failure. [ 1707.249998] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.251111] CPU: 0 PID: 9229 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1707.251759] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.252474] Call Trace: [ 1707.252759] dump_stack+0x107/0x167 [ 1707.253096] should_fail.cold+0x5/0xa [ 1707.253428] ? create_object.isra.0+0x3a/0xa20 [ 1707.253889] should_failslab+0x5/0x20 [ 1707.254218] kmem_cache_alloc+0x5b/0x310 [ 1707.254589] ? mark_held_locks+0x9e/0xe0 [ 1707.255010] create_object.isra.0+0x3a/0xa20 [ 1707.255387] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1707.255890] kmem_cache_alloc_trace+0x151/0x320 [ 1707.256297] register_for_each_vma+0x476/0xc00 [ 1707.256769] __uprobe_register+0x4df/0x880 [ 1707.257164] probe_event_enable+0x368/0xa20 [ 1707.257547] ? uprobe_perf_close+0x5f0/0x5f0 [ 1707.258005] trace_uprobe_register+0x54/0x730 [ 1707.258398] perf_trace_event_init+0x554/0x9c0 [ 1707.258882] perf_uprobe_init+0x173/0x210 [ 1707.259251] perf_uprobe_event_init+0xff/0x1d0 [ 1707.259685] perf_try_init_event+0x130/0x570 [ 1707.260092] perf_event_alloc.part.0+0xd96/0x2b70 [ 1707.260511] __do_sys_perf_event_open+0x579/0x2e60 [ 1707.261017] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1707.261437] ? perf_event_set_output+0x5b0/0x5b0 [ 1707.261886] ? wait_for_completion_io+0x270/0x270 [ 1707.262340] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1707.262854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1707.263317] do_syscall_64+0x33/0x40 [ 1707.263680] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.264143] RIP: 0033:0x7f229d85eb19 [ 1707.264464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.266120] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1707.266852] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1707.267477] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1707.268167] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.268833] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1707.269468] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:19:29 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde1080000002401", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:29 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 85) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) [ 1707.311152] FAULT_INJECTION: forcing a failure. [ 1707.311152] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.312315] CPU: 0 PID: 9230 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1707.312998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.313821] Call Trace: [ 1707.314069] dump_stack+0x107/0x167 [ 1707.314382] should_fail.cold+0x5/0xa [ 1707.314758] ? register_for_each_vma+0x476/0xc00 [ 1707.315191] should_failslab+0x5/0x20 [ 1707.315519] kmem_cache_alloc_trace+0x55/0x320 [ 1707.315959] register_for_each_vma+0x476/0xc00 [ 1707.316383] __uprobe_register+0x4df/0x880 [ 1707.316832] probe_event_enable+0x368/0xa20 [ 1707.317238] ? uprobe_perf_close+0x5f0/0x5f0 [ 1707.317625] trace_uprobe_register+0x54/0x730 [ 1707.318070] perf_trace_event_init+0x554/0x9c0 [ 1707.318491] perf_uprobe_init+0x173/0x210 [ 1707.318899] perf_uprobe_event_init+0xff/0x1d0 [ 1707.319285] perf_try_init_event+0x130/0x570 [ 1707.319734] perf_event_alloc.part.0+0xd96/0x2b70 [ 1707.320149] __do_sys_perf_event_open+0x579/0x2e60 [ 1707.320596] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1707.321091] ? perf_event_set_output+0x5b0/0x5b0 [ 1707.321510] ? wait_for_completion_io+0x270/0x270 [ 1707.321991] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1707.322437] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1707.322940] do_syscall_64+0x33/0x40 [ 1707.323257] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.323755] RIP: 0033:0x7f08909a9b19 [ 1707.324074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.325773] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1707.326422] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1707.327090] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1707.327734] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.328357] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1707.329060] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1707.348134] FAULT_INJECTION: forcing a failure. [ 1707.348134] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.349311] CPU: 1 PID: 9238 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1707.349889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.350588] Call Trace: [ 1707.350820] dump_stack+0x107/0x167 [ 1707.351134] should_fail.cold+0x5/0xa [ 1707.351468] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1707.351905] should_failslab+0x5/0x20 [ 1707.352237] kmem_cache_alloc_trace+0x55/0x320 [ 1707.352629] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1707.353082] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1707.353505] __list_lru_init+0x44d/0x890 [ 1707.353858] alloc_super+0x8b8/0xa90 [ 1707.354178] ? fput+0x20/0x20 [ 1707.354449] sget_fc+0x110/0x860 [ 1707.354741] ? set_anon_super+0xc0/0xc0 [ 1707.355083] ? rpc_kill_sb+0x1b0/0x1b0 [ 1707.355418] get_tree_keyed+0x55/0x210 [ 1707.355754] vfs_get_tree+0x8e/0x300 [ 1707.356072] path_mount+0x1429/0x2120 [ 1707.356407] ? strncpy_from_user+0x9e/0x470 [ 1707.356775] ? finish_automount+0xa90/0xa90 [ 1707.357161] ? getname_flags.part.0+0x1dd/0x4f0 [ 1707.357566] __x64_sys_mount+0x282/0x300 [ 1707.357913] ? copy_mnt_ns+0xa00/0xa00 [ 1707.358260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1707.358710] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1707.359151] do_syscall_64+0x33/0x40 [ 1707.359472] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.359907] RIP: 0033:0x7fe8bba05b19 [ 1707.360229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.361786] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1707.362431] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1707.363031] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1707.363629] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.364229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1707.364834] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:19:29 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 61) 02:19:29 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 56) [ 1707.479084] FAULT_INJECTION: forcing a failure. [ 1707.479084] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.480256] CPU: 0 PID: 9244 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1707.480846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.481568] Call Trace: [ 1707.481801] dump_stack+0x107/0x167 [ 1707.482114] should_fail.cold+0x5/0xa [ 1707.482466] ? register_for_each_vma+0x476/0xc00 [ 1707.485391] should_failslab+0x5/0x20 [ 1707.485744] kmem_cache_alloc_trace+0x55/0x320 [ 1707.486189] register_for_each_vma+0x476/0xc00 [ 1707.486601] __uprobe_register+0x4df/0x880 [ 1707.487132] probe_event_enable+0x368/0xa20 [ 1707.487507] ? uprobe_perf_close+0x5f0/0x5f0 [ 1707.487912] trace_uprobe_register+0x54/0x730 [ 1707.488533] perf_trace_event_init+0x554/0x9c0 [ 1707.488955] perf_uprobe_init+0x173/0x210 [ 1707.489382] perf_uprobe_event_init+0xff/0x1d0 [ 1707.489778] perf_try_init_event+0x130/0x570 [ 1707.490269] perf_event_alloc.part.0+0xd96/0x2b70 [ 1707.490776] __do_sys_perf_event_open+0x579/0x2e60 [ 1707.491227] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1707.491640] ? perf_event_set_output+0x5b0/0x5b0 [ 1707.492057] ? wait_for_completion_io+0x270/0x270 [ 1707.492493] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1707.492935] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1707.493406] do_syscall_64+0x33/0x40 [ 1707.493727] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.495267] RIP: 0033:0x7f229d85eb19 [ 1707.495584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.497309] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1707.498082] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1707.498709] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1707.499307] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.499923] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1707.500540] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1707.521153] FAULT_INJECTION: forcing a failure. [ 1707.521153] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.522262] CPU: 1 PID: 9246 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1707.522896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1707.523643] Call Trace: [ 1707.523902] dump_stack+0x107/0x167 [ 1707.524249] should_fail.cold+0x5/0xa [ 1707.524615] ? create_object.isra.0+0x3a/0xa20 [ 1707.525046] should_failslab+0x5/0x20 [ 1707.525386] kmem_cache_alloc+0x5b/0x310 [ 1707.525751] ? mark_held_locks+0x9e/0xe0 [ 1707.526110] create_object.isra.0+0x3a/0xa20 [ 1707.526495] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1707.526949] kmem_cache_alloc_trace+0x151/0x320 [ 1707.527363] register_for_each_vma+0x476/0xc00 [ 1707.527775] __uprobe_register+0x4df/0x880 [ 1707.528160] probe_event_enable+0x368/0xa20 [ 1707.528538] ? uprobe_perf_close+0x5f0/0x5f0 [ 1707.528937] trace_uprobe_register+0x54/0x730 [ 1707.529356] perf_trace_event_init+0x554/0x9c0 [ 1707.529764] perf_uprobe_init+0x173/0x210 [ 1707.530141] perf_uprobe_event_init+0xff/0x1d0 [ 1707.530534] perf_try_init_event+0x130/0x570 [ 1707.530922] perf_event_alloc.part.0+0xd96/0x2b70 [ 1707.531346] __do_sys_perf_event_open+0x579/0x2e60 [ 1707.531785] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1707.532202] ? perf_event_set_output+0x5b0/0x5b0 [ 1707.532611] ? wait_for_completion_io+0x270/0x270 [ 1707.533065] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1707.533521] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1707.533968] do_syscall_64+0x33/0x40 [ 1707.534293] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1707.534739] RIP: 0033:0x7f08909a9b19 [ 1707.535067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1707.536624] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1707.537294] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1707.537902] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1707.538517] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.539125] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1707.539736] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1707.625081] blktrace: Concurrent blktraces are not allowed on sg0 02:19:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) 02:19:42 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde1080000002401", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:42 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x24924924, 0x7}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) 02:19:42 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 57) 02:19:42 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 86) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:19:42 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 62) 02:19:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x4}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000180), 0x4) gettid() 02:19:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001540)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x560b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) r0 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000180), 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYBLOB="ffff00000000080000000000000008000000000010000bef00000032c5abfd91881b0400000280000000000000ff0f000000000000040000000219000005000000040000000000000000000000000000120900000000001b2000"/121]) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xfd, 0xe6, 0x0, 0x9, 0x0, 0x2, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x82a, 0x2, 0x3c73, 0x2, 0x40, 0x1, 0x3ff, 0x0, 0x10000, 0x0, 0x1}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) [ 1720.630824] FAULT_INJECTION: forcing a failure. [ 1720.630824] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.632814] CPU: 0 PID: 9263 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1720.633519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.634248] Call Trace: [ 1720.634480] dump_stack+0x107/0x167 [ 1720.634788] should_fail.cold+0x5/0xa [ 1720.635113] ? create_object.isra.0+0x3a/0xa20 [ 1720.635551] should_failslab+0x5/0x20 [ 1720.635876] kmem_cache_alloc+0x5b/0x310 [ 1720.636289] ? mark_held_locks+0x9e/0xe0 [ 1720.636636] create_object.isra.0+0x3a/0xa20 [ 1720.637007] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1720.638253] kmem_cache_alloc_trace+0x151/0x320 [ 1720.638660] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1720.639077] __list_lru_init+0x44d/0x890 [ 1720.639476] alloc_super+0x8b8/0xa90 [ 1720.639794] ? fput+0x20/0x20 [ 1720.640059] sget_fc+0x110/0x860 [ 1720.640406] ? set_anon_super+0xc0/0xc0 [ 1720.640744] ? rpc_kill_sb+0x1b0/0x1b0 [ 1720.641082] get_tree_keyed+0x55/0x210 [ 1720.641502] vfs_get_tree+0x8e/0x300 [ 1720.641821] path_mount+0x1429/0x2120 [ 1720.642153] ? strncpy_from_user+0x9e/0x470 [ 1720.642523] ? finish_automount+0xa90/0xa90 [ 1720.642889] ? getname_flags.part.0+0x1dd/0x4f0 [ 1720.643290] __x64_sys_mount+0x282/0x300 [ 1720.643633] ? copy_mnt_ns+0xa00/0xa00 [ 1720.643968] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.644415] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.644851] do_syscall_64+0x33/0x40 [ 1720.645365] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1720.646488] RIP: 0033:0x7fe8bba05b19 [ 1720.647302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.651336] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1720.652995] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1720.654557] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1720.656108] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.657650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1720.658857] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 [ 1720.661704] FAULT_INJECTION: forcing a failure. [ 1720.661704] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.662785] CPU: 1 PID: 9262 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1720.663371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.664073] Call Trace: [ 1720.664312] dump_stack+0x107/0x167 [ 1720.664630] should_fail.cold+0x5/0xa [ 1720.664970] ? register_for_each_vma+0x476/0xc00 [ 1720.665409] should_failslab+0x5/0x20 [ 1720.665743] kmem_cache_alloc_trace+0x55/0x320 [ 1720.666144] register_for_each_vma+0x476/0xc00 [ 1720.666553] __uprobe_register+0x4df/0x880 [ 1720.666943] probe_event_enable+0x368/0xa20 [ 1720.667316] ? uprobe_perf_close+0x5f0/0x5f0 [ 1720.667702] trace_uprobe_register+0x54/0x730 [ 1720.668098] perf_trace_event_init+0x554/0x9c0 [ 1720.668504] perf_uprobe_init+0x173/0x210 [ 1720.668870] perf_uprobe_event_init+0xff/0x1d0 [ 1720.669281] perf_try_init_event+0x130/0x570 [ 1720.669661] perf_event_alloc.part.0+0xd96/0x2b70 [ 1720.670082] __do_sys_perf_event_open+0x579/0x2e60 [ 1720.670516] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1720.670931] ? perf_event_set_output+0x5b0/0x5b0 [ 1720.671340] ? wait_for_completion_io+0x270/0x270 [ 1720.671777] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.672227] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.672671] do_syscall_64+0x33/0x40 [ 1720.672994] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1720.673454] RIP: 0033:0x7f08909a9b19 [ 1720.673778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.675331] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1720.675347] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1720.675356] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1720.675370] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.677814] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1720.678421] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1720.694353] FAULT_INJECTION: forcing a failure. [ 1720.694353] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.695340] CPU: 1 PID: 9254 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1720.695918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.696616] Call Trace: [ 1720.696851] dump_stack+0x107/0x167 [ 1720.697184] should_fail.cold+0x5/0xa [ 1720.697518] ? create_object.isra.0+0x3a/0xa20 [ 1720.697918] should_failslab+0x5/0x20 [ 1720.698251] kmem_cache_alloc+0x5b/0x310 [ 1720.698604] ? mark_held_locks+0x9e/0xe0 [ 1720.698954] create_object.isra.0+0x3a/0xa20 [ 1720.699336] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1720.699775] kmem_cache_alloc_trace+0x151/0x320 [ 1720.700188] register_for_each_vma+0x476/0xc00 [ 1720.700594] __uprobe_register+0x4df/0x880 [ 1720.700974] probe_event_enable+0x368/0xa20 [ 1720.701376] ? uprobe_perf_close+0x5f0/0x5f0 [ 1720.701761] trace_uprobe_register+0x54/0x730 [ 1720.702157] perf_trace_event_init+0x554/0x9c0 [ 1720.702556] perf_uprobe_init+0x173/0x210 [ 1720.702921] perf_uprobe_event_init+0xff/0x1d0 [ 1720.703313] perf_try_init_event+0x130/0x570 [ 1720.703692] perf_event_alloc.part.0+0xd96/0x2b70 [ 1720.704115] __do_sys_perf_event_open+0x579/0x2e60 [ 1720.704548] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1720.704963] ? perf_event_set_output+0x5b0/0x5b0 [ 1720.705430] ? wait_for_completion_io+0x270/0x270 [ 1720.705857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.706304] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.706748] do_syscall_64+0x33/0x40 [ 1720.707068] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1720.707504] RIP: 0033:0x7f229d85eb19 [ 1720.707823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.709380] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1720.710023] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1720.710624] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1720.711221] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.711818] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1720.712418] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 02:19:43 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde1080000002401", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) 02:19:43 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 87) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:19:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001500), &(0x7f0000001540)=0xc) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0xc) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0x227b, &(0x7f0000000080)={'\x00', 0x1f, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_open_procfs(r1, &(0x7f0000000200)='pagemap\x00') [ 1720.775009] FAULT_INJECTION: forcing a failure. [ 1720.775009] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.776098] CPU: 1 PID: 9272 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1720.776700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.777445] Call Trace: [ 1720.777694] dump_stack+0x107/0x167 [ 1720.778007] should_fail.cold+0x5/0xa [ 1720.778338] ? __memcg_init_list_lru_node+0x7f/0x1e0 [ 1720.778776] should_failslab+0x5/0x20 [ 1720.779107] kmem_cache_alloc_trace+0x55/0x320 [ 1720.779502] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1720.779937] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1720.780359] __list_lru_init+0x44d/0x890 [ 1720.780712] alloc_super+0x8b8/0xa90 [ 1720.781033] ? fput+0x20/0x20 [ 1720.781326] sget_fc+0x110/0x860 [ 1720.781617] ? set_anon_super+0xc0/0xc0 [ 1720.781959] ? rpc_kill_sb+0x1b0/0x1b0 [ 1720.782293] get_tree_keyed+0x55/0x210 [ 1720.782626] vfs_get_tree+0x8e/0x300 [ 1720.782944] path_mount+0x1429/0x2120 [ 1720.783279] ? strncpy_from_user+0x9e/0x470 [ 1720.783648] ? finish_automount+0xa90/0xa90 [ 1720.784016] ? getname_flags.part.0+0x1dd/0x4f0 [ 1720.784420] __x64_sys_mount+0x282/0x300 [ 1720.784770] ? copy_mnt_ns+0xa00/0xa00 [ 1720.785120] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.785569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.786007] do_syscall_64+0x33/0x40 [ 1720.786327] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1720.786887] RIP: 0033:0x7fe8bba05b19 [ 1720.787207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.788748] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1720.789403] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1720.790123] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1720.790728] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.791334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1720.791935] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:19:43 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 58) 02:19:43 executing program 0: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 63) 02:19:43 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde108000000240100", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1720.830566] FAULT_INJECTION: forcing a failure. [ 1720.830566] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.831610] CPU: 0 PID: 9282 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1720.832187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.832885] Call Trace: [ 1720.833133] dump_stack+0x107/0x167 [ 1720.833452] should_fail.cold+0x5/0xa [ 1720.833787] ? create_object.isra.0+0x3a/0xa20 [ 1720.834189] should_failslab+0x5/0x20 [ 1720.834526] kmem_cache_alloc+0x5b/0x310 [ 1720.834882] ? mark_held_locks+0x9e/0xe0 [ 1720.835238] create_object.isra.0+0x3a/0xa20 [ 1720.835621] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1720.836063] kmem_cache_alloc_trace+0x151/0x320 [ 1720.836472] register_for_each_vma+0x476/0xc00 [ 1720.836879] __uprobe_register+0x4df/0x880 [ 1720.837277] probe_event_enable+0x368/0xa20 [ 1720.837651] ? uprobe_perf_close+0x5f0/0x5f0 [ 1720.838038] trace_uprobe_register+0x54/0x730 [ 1720.838436] perf_trace_event_init+0x554/0x9c0 [ 1720.838836] perf_uprobe_init+0x173/0x210 [ 1720.839202] perf_uprobe_event_init+0xff/0x1d0 [ 1720.839595] perf_try_init_event+0x130/0x570 [ 1720.839976] perf_event_alloc.part.0+0xd96/0x2b70 [ 1720.840401] __do_sys_perf_event_open+0x579/0x2e60 [ 1720.840833] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1720.841260] ? perf_event_set_output+0x5b0/0x5b0 [ 1720.841664] ? wait_for_completion_io+0x270/0x270 [ 1720.842093] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.842542] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.842985] do_syscall_64+0x33/0x40 [ 1720.843306] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1720.843743] RIP: 0033:0x7f08909a9b19 [ 1720.844063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.845625] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1720.846273] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1720.846877] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1720.847482] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.848086] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1720.848688] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 02:19:43 executing program 4: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000005a00)={&(0x7f00000011c0), 0xc, 0x0}, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) (fail_nth: 88) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) getpgrp(0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0xff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000280)) r2 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) 02:19:43 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde108000000240100", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1720.933324] FAULT_INJECTION: forcing a failure. [ 1720.933324] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.934374] CPU: 1 PID: 9288 Comm: syz-executor.0 Not tainted 5.10.224 #1 [ 1720.934949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.935655] Call Trace: [ 1720.935890] dump_stack+0x107/0x167 [ 1720.936207] should_fail.cold+0x5/0xa [ 1720.936541] ? register_for_each_vma+0x476/0xc00 [ 1720.936957] should_failslab+0x5/0x20 [ 1720.937313] kmem_cache_alloc_trace+0x55/0x320 [ 1720.937709] register_for_each_vma+0x476/0xc00 [ 1720.938113] __uprobe_register+0x4df/0x880 [ 1720.938495] probe_event_enable+0x368/0xa20 [ 1720.938866] ? uprobe_perf_close+0x5f0/0x5f0 [ 1720.939251] trace_uprobe_register+0x54/0x730 [ 1720.939645] perf_trace_event_init+0x554/0x9c0 [ 1720.940045] perf_uprobe_init+0x173/0x210 [ 1720.940410] perf_uprobe_event_init+0xff/0x1d0 [ 1720.940799] perf_try_init_event+0x130/0x570 [ 1720.941197] perf_event_alloc.part.0+0xd96/0x2b70 [ 1720.941277] FAULT_INJECTION: forcing a failure. [ 1720.941277] name failslab, interval 1, probability 0, space 0, times 0 [ 1720.941615] __do_sys_perf_event_open+0x579/0x2e60 [ 1720.941642] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1720.943399] ? perf_event_set_output+0x5b0/0x5b0 [ 1720.943803] ? wait_for_completion_io+0x270/0x270 [ 1720.944236] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.944681] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.945132] do_syscall_64+0x33/0x40 [ 1720.945460] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1720.945900] RIP: 0033:0x7f229d85eb19 [ 1720.946221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.947757] RSP: 002b:00007f229add4188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1720.948402] RAX: ffffffffffffffda RBX: 00007f229d971f60 RCX: 00007f229d85eb19 [ 1720.949000] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1720.949616] RBP: 00007f229add41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.950216] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1720.950814] R13: 00007ffcb927392f R14: 00007f229add4300 R15: 0000000000022000 [ 1720.951438] CPU: 0 PID: 9293 Comm: syz-executor.4 Not tainted 5.10.224 #1 [ 1720.952028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.952742] Call Trace: [ 1720.952986] dump_stack+0x107/0x167 [ 1720.953327] should_fail.cold+0x5/0xa [ 1720.953658] ? create_object.isra.0+0x3a/0xa20 [ 1720.954055] should_failslab+0x5/0x20 [ 1720.954388] kmem_cache_alloc+0x5b/0x310 [ 1720.954740] ? mark_held_locks+0x9e/0xe0 [ 1720.955090] create_object.isra.0+0x3a/0xa20 [ 1720.955469] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1720.955918] kmem_cache_alloc_trace+0x151/0x320 [ 1720.956320] __memcg_init_list_lru_node+0x7f/0x1e0 [ 1720.956741] __list_lru_init+0x44d/0x890 [ 1720.957100] alloc_super+0x8b8/0xa90 [ 1720.957424] ? fput+0x20/0x20 [ 1720.957692] sget_fc+0x110/0x860 [ 1720.957983] ? set_anon_super+0xc0/0xc0 [ 1720.958325] ? rpc_kill_sb+0x1b0/0x1b0 [ 1720.958657] get_tree_keyed+0x55/0x210 [ 1720.958994] vfs_get_tree+0x8e/0x300 [ 1720.959313] path_mount+0x1429/0x2120 [ 1720.959646] ? strncpy_from_user+0x9e/0x470 [ 1720.960012] ? finish_automount+0xa90/0xa90 [ 1720.960381] ? getname_flags.part.0+0x1dd/0x4f0 [ 1720.960783] __x64_sys_mount+0x282/0x300 [ 1720.961135] ? copy_mnt_ns+0xa00/0xa00 [ 1720.961476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.961929] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.962368] do_syscall_64+0x33/0x40 [ 1720.962688] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1720.963121] RIP: 0033:0x7fe8bba05b19 [ 1720.963440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.964975] RSP: 002b:00007fe8b8f7b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1720.965634] RAX: ffffffffffffffda RBX: 00007fe8bbb18f60 RCX: 00007fe8bba05b19 [ 1720.966237] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000000000 [ 1720.966837] RBP: 00007fe8b8f7b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.967440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1720.968046] R13: 00007ffdb06e738f R14: 00007fe8b8f7b300 R15: 0000000000022000 02:19:43 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000200), 0x24, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 59) 02:19:43 executing program 6: ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000040)) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, 0x0, 0x84c00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ptrace(0x10, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000440)) ptrace$poke(0x4, 0x0, &(0x7f0000000180), 0x1) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000280)=0xff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="a9cde108000000240100", @ANYRES16=0x0, @ANYBLOB="000428bd7000fcf4d025250000000e000100e895bf6e657464657673696d0000000f0002006e657123957464657673696d30000008", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0000000000080001007063690011000200303030303a30303a31302e300000000008008c00000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008a00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673", @ANYRES32, @ANYBLOB], 0x128}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) [ 1721.048507] FAULT_INJECTION: forcing a failure. [ 1721.048507] name failslab, interval 1, probability 0, space 0, times 0 [ 1721.049664] CPU: 1 PID: 9298 Comm: syz-executor.1 Not tainted 5.10.224 #1 [ 1721.050246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1721.050943] Call Trace: [ 1721.051178] dump_stack+0x107/0x167 [ 1721.051496] should_fail.cold+0x5/0xa [ 1721.051838] ? register_for_each_vma+0x476/0xc00 [ 1721.052252] should_failslab+0x5/0x20 [ 1721.052586] kmem_cache_alloc_trace+0x55/0x320 [ 1721.052983] register_for_each_vma+0x476/0xc00 [ 1721.053408] __uprobe_register+0x4df/0x880 [ 1721.053788] probe_event_enable+0x368/0xa20 [ 1721.054158] ? uprobe_perf_close+0x5f0/0x5f0 [ 1721.054544] trace_uprobe_register+0x54/0x730 [ 1721.054938] perf_trace_event_init+0x554/0x9c0 [ 1721.055337] perf_uprobe_init+0x173/0x210 [ 1721.055704] perf_uprobe_event_init+0xff/0x1d0 [ 1721.056093] perf_try_init_event+0x130/0x570 [ 1721.056473] perf_event_alloc.part.0+0xd96/0x2b70 [ 1721.056896] __do_sys_perf_event_open+0x579/0x2e60 [ 1721.057345] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1721.057760] ? perf_event_set_output+0x5b0/0x5b0 [ 1721.058165] ? wait_for_completion_io+0x270/0x270 [ 1721.058599] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1721.059047] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1721.059491] do_syscall_64+0x33/0x40 [ 1721.059812] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1721.060252] RIP: 0033:0x7f08909a9b19 [ 1721.060573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1721.062127] RSP: 002b:00007f088df1f188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1721.062773] RAX: ffffffffffffffda RBX: 00007f0890abcf60 RCX: 00007f08909a9b19 [ 1721.063382] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000040 [ 1721.063983] RBP: 00007f088df1f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1721.064588] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 1721.065208] R13: 00007fffb06a859f R14: 00007f088df1f300 R15: 0000000000022000 [ 1723.008269] syz-executor.2 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1723.009409] CPU: 0 PID: 289 Comm: syz-executor.2 Not tainted 5.10.224 #1 [ 1723.009972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.010665] Call Trace: [ 1723.010902] dump_stack+0x107/0x167 [ 1723.011214] dump_header+0x106/0x655 [ 1723.011533] oom_kill_process.cold+0x10/0x15 [ 1723.011909] out_of_memory+0x1149/0x1440 [ 1723.012259] ? oom_killer_disable+0x280/0x280 [ 1723.012643] ? mutex_trylock+0x237/0x2b0 [ 1723.012987] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1723.013502] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1723.014003] ? __switch_to_asm+0x27/0x60 [ 1723.014351] ? warn_alloc+0x190/0x190 [ 1723.014688] __alloc_pages_nodemask+0x51d/0x600 [ 1723.015084] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1723.015591] ? find_get_entry+0x2c8/0x740 [ 1723.015949] alloc_pages_current+0x187/0x280 [ 1723.016324] __page_cache_alloc+0x2d2/0x360 [ 1723.016693] pagecache_get_page+0x2c7/0xc80 [ 1723.017063] filemap_fault+0x177d/0x2210 [ 1723.017429] ? read_cache_page_gfp+0x30/0x30 [ 1723.017803] ? replace_page_cache_page+0x1200/0x1200 [ 1723.018231] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1723.018680] ext4_filemap_fault+0x87/0xc0 [ 1723.019030] __do_fault+0x113/0x410 [ 1723.019344] handle_mm_fault+0x1e53/0x3500 [ 1723.019708] ? __pmd_alloc+0x5e0/0x5e0 [ 1723.020044] ? vmacache_find+0x55/0x2a0 [ 1723.020390] do_user_addr_fault+0x56e/0xc60 [ 1723.020761] exc_page_fault+0xa2/0x1a0 [ 1723.021096] ? asm_exc_page_fault+0x8/0x30 [ 1723.021464] asm_exc_page_fault+0x1e/0x30 [ 1723.021811] RIP: 0033:0x7f850afc4688 [ 1723.022129] Code: Unable to access opcode bytes at RIP 0x7f850afc465e. [ 1723.022678] RSP: 002b:00007ffe5f0547b0 EFLAGS: 00010206 [ 1723.023128] RAX: 0000001b2d520000 RBX: 000000000000023f RCX: 00000000001a4690 [ 1723.023726] RDX: 00000000001a48ac RSI: 00007ffe5f054870 RDI: 0000000000000001 [ 1723.024323] RBP: 00007ffe5f05480c R08: 00000000000006ba R09: 00007ffe5f143080 [ 1723.024919] R10: 00007ffe5f143090 R11: 00000000002bdcc4 R12: 0000000000000032 [ 1723.025527] R13: 00000000001a44ce R14: 000000000000000a R15: 00007ffe5f054870 [ 1723.026240] Mem-Info: [ 1723.026479] active_anon:150 inactive_anon:61252 isolated_anon:0 [ 1723.026479] active_file:47 inactive_file:0 isolated_file:0 [ 1723.026479] unevictable:0 dirty:0 writeback:0 [ 1723.026479] slab_reclaimable:8405 slab_unreclaimable:60905 [ 1723.026479] mapped:69634 shmem:117 pagetables:1442 bounce:0 [ 1723.026479] free:3378 free_pcp:126 free_cma:0 [ 1723.029072] Node 0 active_anon:600kB inactive_anon:245008kB active_file:188kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278536kB dirty:0kB writeback:0kB shmem:468kB writeback_tmp:0kB kernel_stack:4224kB all_unreclaimable? no [ 1723.030982] Node 0 DMA free:6512kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1723.033155] lowmem_reserve[]: 0 1616 1616 1616 [ 1723.033590] Node 0 DMA32 free:7000kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:600kB inactive_anon:245008kB active_file:188kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:5768kB bounce:0kB free_pcp:504kB local_pcp:256kB free_cma:0kB [ 1723.035972] lowmem_reserve[]: 0 0 0 0 [ 1723.036332] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6512kB [ 1723.037588] Node 0 DMA32: 594*4kB (MEH) 212*8kB (UMEH) 88*16kB (UMEH) 31*32kB (UMH) 6*64kB (UMH) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6984kB [ 1723.038901] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1723.039632] 156 total pagecache pages [ 1723.039959] 0 pages in swap cache [ 1723.040274] Swap cache stats: add 0, delete 0, find 0/0 [ 1723.040725] Free swap = 0kB [ 1723.040984] Total swap = 0kB [ 1723.041272] 524158 pages RAM [ 1723.041525] 0 pages HighMem/MovableOnly [ 1723.041854] 105064 pages reserved [ 1723.042144] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0,global_oom,task_memcg=/syz2,task=syz-executor.2,pid=289,uid=0 [ 1723.043906] Out of memory (oom_kill_allocating_task): Killed process 289 (syz-executor.2) total-vm:93280kB, anon-rss:384kB, file-rss:34756kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:0 [ 1723.047491] syz-executor.5 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1723.048452] CPU: 1 PID: 284 Comm: syz-executor.5 Not tainted 5.10.224 #1 [ 1723.049018] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.049733] Call Trace: [ 1723.049965] dump_stack+0x107/0x167 [ 1723.050279] dump_header+0x106/0x655 [ 1723.050597] oom_kill_process.cold+0x10/0x15 [ 1723.050974] out_of_memory+0x1149/0x1440 [ 1723.051325] ? oom_killer_disable+0x280/0x280 [ 1723.051709] ? mutex_trylock+0x237/0x2b0 [ 1723.052052] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1723.052553] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1723.053054] ? lock_acquire+0x107/0x470 [ 1723.053411] ? warn_alloc+0x190/0x190 [ 1723.053749] __alloc_pages_nodemask+0x51d/0x600 [ 1723.054144] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1723.054653] ? find_get_entry+0x2c8/0x740 [ 1723.055011] alloc_pages_current+0x187/0x280 [ 1723.055385] __page_cache_alloc+0x2d2/0x360 [ 1723.055753] pagecache_get_page+0x2c7/0xc80 [ 1723.056122] filemap_fault+0x177d/0x2210 [ 1723.056474] ? read_cache_page_gfp+0x30/0x30 [ 1723.056848] ? replace_page_cache_page+0x1200/0x1200 [ 1723.057290] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1723.057737] ext4_filemap_fault+0x87/0xc0 [ 1723.058087] __do_fault+0x113/0x410 [ 1723.058399] handle_mm_fault+0x1e53/0x3500 [ 1723.058763] ? __pmd_alloc+0x5e0/0x5e0 [ 1723.059098] ? vmacache_find+0x55/0x2a0 [ 1723.059443] do_user_addr_fault+0x56e/0xc60 [ 1723.059813] exc_page_fault+0xa2/0x1a0 [ 1723.060141] ? asm_exc_page_fault+0x8/0x30 [ 1723.060498] asm_exc_page_fault+0x1e/0x30 [ 1723.060843] RIP: 0033:0x7ffb8b320ab5 [ 1723.061174] Code: Unable to access opcode bytes at RIP 0x7ffb8b320a8b. [ 1723.061723] RSP: 002b:00007fffe46571f0 EFLAGS: 00010206 [ 1723.062173] RAX: 0000000000000000 RBX: 0000000000000282 RCX: 00007ffb8b3458e1 [ 1723.062767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1723.063364] RBP: 00007fffe465727c R08: 0000000000000000 R09: 00007fffe46be080 [ 1723.063959] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000032 [ 1723.064556] R13: 00000000001a4149 R14: 000000000000000e R15: 00007fffe46572e0 [ 1723.065228] Mem-Info: [ 1723.065459] active_anon:150 inactive_anon:61252 isolated_anon:0 [ 1723.065459] active_file:47 inactive_file:9 isolated_file:0 [ 1723.065459] unevictable:0 dirty:0 writeback:0 [ 1723.065459] slab_reclaimable:8405 slab_unreclaimable:60905 [ 1723.065459] mapped:69634 shmem:117 pagetables:1442 bounce:0 [ 1723.065459] free:3378 free_pcp:62 free_cma:0 [ 1723.068037] Node 0 active_anon:600kB inactive_anon:245008kB active_file:188kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278536kB dirty:0kB writeback:0kB shmem:468kB writeback_tmp:0kB kernel_stack:4224kB all_unreclaimable? no [ 1723.069947] Node 0 DMA free:6512kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1723.072120] lowmem_reserve[]: 0 1616 1616 1616 [ 1723.072545] Node 0 DMA32 free:7000kB min:5116kB low:6768kB high:8420kB reserved_highatomic:2048KB active_anon:600kB inactive_anon:245008kB active_file:188kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:5768kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 1723.074953] lowmem_reserve[]: 0 0 0 0 [ 1723.075317] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6512kB [ 1723.076490] Node 0 DMA32: 617*4kB (UMEH) 232*8kB (UMEH) 88*16kB (UMEH) 31*32kB (UMH) 6*64kB (UMH) 1*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 7236kB [ 1723.077828] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1723.078544] 156 total pagecache pages [ 1723.078863] 0 pages in swap cache [ 1723.079154] Swap cache stats: add 0, delete 0, find 0/0 [ 1723.079724] Free swap = 0kB [ 1723.079978] Total swap = 0kB [ 1723.080250] 524158 pages RAM [ 1723.080503] 0 pages HighMem/MovableOnly [ 1723.080831] 105064 pages reserved [ 1723.081133] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz5,mems_allowed=0,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=284,uid=0 [ 1723.082570] Out of memory (oom_kill_allocating_task): Killed process 284 (syz-executor.5) total-vm:93280kB, anon-rss:388kB, file-rss:34752kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:0 [ 1723.482473] systemd-udevd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-1000 [ 1723.483464] CPU: 1 PID: 117 Comm: systemd-udevd Not tainted 5.10.224 #1 [ 1723.484030] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.484732] Call Trace: [ 1723.484960] dump_stack+0x107/0x167 [ 1723.485292] dump_header+0x106/0x655 [ 1723.485616] oom_kill_process.cold+0x10/0x15 [ 1723.486001] out_of_memory+0x358/0x1440 [ 1723.486348] ? oom_killer_disable+0x280/0x280 [ 1723.486734] ? mutex_trylock+0x237/0x2b0 [ 1723.487081] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1723.487588] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1723.488100] ? lock_acquire+0x107/0x470 [ 1723.488735] ? warn_alloc+0x190/0x190 [ 1723.489428] __alloc_pages_nodemask+0x51d/0x600 [ 1723.490539] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1723.491963] ? find_get_entry+0x2c8/0x740 [ 1723.492949] alloc_pages_current+0x187/0x280 [ 1723.494003] __page_cache_alloc+0x2d2/0x360 [ 1723.495030] pagecache_get_page+0x2c7/0xc80 [ 1723.496054] filemap_fault+0x177d/0x2210 [ 1723.497019] ? read_cache_page_gfp+0x30/0x30 [ 1723.498072] ? replace_page_cache_page+0x1200/0x1200 [ 1723.499274] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1723.500522] ext4_filemap_fault+0x87/0xc0 [ 1723.501514] __do_fault+0x113/0x410 [ 1723.502379] handle_mm_fault+0x1e53/0x3500 [ 1723.503392] ? __pmd_alloc+0x5e0/0x5e0 [ 1723.504319] ? vmacache_find+0x55/0x2a0 [ 1723.505265] ? vmacache_update+0xce/0x140 [ 1723.506247] do_user_addr_fault+0x56e/0xc60 [ 1723.507271] exc_page_fault+0xa2/0x1a0 [ 1723.508189] ? asm_exc_page_fault+0x8/0x30 [ 1723.509191] asm_exc_page_fault+0x1e/0x30 [ 1723.510197] RIP: 0033:0x7f2f6def20d6 [ 1723.511182] Code: Unable to access opcode bytes at RIP 0x7f2f6def20ac. [ 1723.512928] RSP: 002b:00007fffc03c7998 EFLAGS: 00010246 [ 1723.514119] RAX: 0000000000000001 RBX: 0000555954b37590 RCX: 00007f2f6def20d6 [ 1723.515910] RDX: 000000000000000a RSI: 00005559553a5af0 RDI: 000000000000000a [ 1723.517691] RBP: ffffffffffffffff R08: 000000000000000a R09: 00007fffc03e5080 [ 1723.519252] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1723.520979] R13: 000000000000000a R14: 00005559544192e6 R15: 0000000000000000 [ 1723.522615] Mem-Info: [ 1723.523169] active_anon:150 inactive_anon:61211 isolated_anon:0 [ 1723.523169] active_file:31 inactive_file:65 isolated_file:0 [ 1723.523169] unevictable:0 dirty:0 writeback:0 [ 1723.523169] slab_reclaimable:8405 slab_unreclaimable:60772 [ 1723.523169] mapped:69689 shmem:117 pagetables:1388 bounce:0 [ 1723.523169] free:2860 free_pcp:90 free_cma:0 [ 1723.530233] Node 0 active_anon:600kB inactive_anon:244844kB active_file:208kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278756kB dirty:0kB writeback:0kB shmem:468kB writeback_tmp:0kB kernel_stack:4192kB all_unreclaimable? no [ 1723.535232] Node 0 DMA free:6512kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1723.540913] lowmem_reserve[]: 0 1616 1616 1616 [ 1723.541987] Node 0 DMA32 free:4928kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:600kB inactive_anon:244928kB active_file:20kB inactive_file:200kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:5552kB bounce:0kB free_pcp:528kB local_pcp:112kB free_cma:0kB [ 1723.548970] lowmem_reserve[]: 0 0 0 0 [ 1723.549949] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6512kB [ 1723.552816] Node 0 DMA32: 439*4kB (UME) 182*8kB (UME) 67*16kB (UME) 15*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4828kB [ 1723.555918] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1723.557823] 176 total pagecache pages [ 1723.558666] 0 pages in swap cache [ 1723.559438] Swap cache stats: add 0, delete 0, find 0/0 [ 1723.560609] Free swap = 0kB [ 1723.561323] Total swap = 0kB [ 1723.561985] 524158 pages RAM [ 1723.562662] 0 pages HighMem/MovableOnly [ 1723.563546] 105064 pages reserved [ 1723.564320] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/syz5,task=syz-executor.5,pid=9255,uid=0 [ 1723.567583] Out of memory: Killed process 9257 (syz-executor.5) total-vm:93940kB, anon-rss:460kB, file-rss:34820kB, shmem-rss:0kB, UID:0 pgtables:136kB oom_score_adj:1000 [ 1723.980793] syz-executor.7 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1723.981831] CPU: 0 PID: 287 Comm: syz-executor.7 Not tainted 5.10.224 #1 [ 1723.982498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1723.983309] Call Trace: [ 1723.983561] dump_stack+0x107/0x167 [ 1723.983907] dump_header+0x106/0x655 [ 1723.984286] oom_kill_process.cold+0x10/0x15 [ 1723.984723] out_of_memory+0x1149/0x1440 [ 1723.985126] ? oom_killer_disable+0x280/0x280 [ 1723.985577] ? mutex_trylock+0x237/0x2b0 [ 1723.985964] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1723.986548] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1723.987123] ? lock_acquire+0x107/0x470 [ 1723.987521] ? warn_alloc+0x190/0x190 [ 1723.987908] __alloc_pages_nodemask+0x51d/0x600 [ 1723.988350] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1723.988935] ? find_get_entry+0x2c8/0x740 [ 1723.989344] alloc_pages_current+0x187/0x280 [ 1723.989792] __page_cache_alloc+0x2d2/0x360 [ 1723.990206] pagecache_get_page+0x2c7/0xc80 [ 1723.990629] filemap_fault+0x177d/0x2210 [ 1723.991030] ? read_cache_page_gfp+0x30/0x30 [ 1723.991450] ? replace_page_cache_page+0x1200/0x1200 [ 1723.991962] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1723.992476] ext4_filemap_fault+0x87/0xc0 [ 1723.992886] __do_fault+0x113/0x410 [ 1723.993239] handle_mm_fault+0x1e53/0x3500 [ 1723.993658] ? __pmd_alloc+0x5e0/0x5e0 [ 1723.994049] ? vmacache_find+0x55/0x2a0 [ 1723.994441] do_user_addr_fault+0x56e/0xc60 [ 1723.994873] exc_page_fault+0xa2/0x1a0 [ 1723.995248] ? asm_exc_page_fault+0x8/0x30 [ 1723.995662] asm_exc_page_fault+0x1e/0x30 [ 1723.996069] RIP: 0033:0x7f588fb197e0 [ 1723.996430] Code: Unable to access opcode bytes at RIP 0x7f588fb197b6. [ 1723.997067] RSP: 002b:00007ffeafb6eb38 EFLAGS: 00010246 [ 1723.997588] RAX: 0000000000000000 RBX: 0000000000000256 RCX: 0000000000000010 [ 1723.998286] RDX: 0000000000000873 RSI: 0000000000000256 RDI: 00007f588fbd7053 [ 1723.998964] RBP: 00007ffeafb6eb9c R08: 00000000000006bb R09: 00007ffeafba4080 [ 1723.999662] R10: 00007ffeafba4090 R11: 00000000002be414 R12: 0000000000000064 [ 1724.000351] R13: 00000000001a442e R14: 0000000000000010 R15: 00007ffeafb6ec00 [ 1724.001119] Mem-Info: [ 1724.001380] active_anon:150 inactive_anon:61211 isolated_anon:0 [ 1724.001380] active_file:8 inactive_file:35 isolated_file:0 [ 1724.001380] unevictable:0 dirty:0 writeback:0 [ 1724.001380] slab_reclaimable:8405 slab_unreclaimable:60772 [ 1724.001380] mapped:69647 shmem:117 pagetables:1388 bounce:0 [ 1724.001380] free:2801 free_pcp:0 free_cma:0 [ 1724.003964] Node 0 active_anon:600kB inactive_anon:244844kB active_file:32kB inactive_file:140kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278588kB dirty:0kB writeback:0kB shmem:468kB writeback_tmp:0kB kernel_stack:4192kB all_unreclaimable? yes [ 1724.005897] Node 0 DMA free:6512kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1724.008081] lowmem_reserve[]: 0 1616 1616 1616 [ 1724.008516] Node 0 DMA32 free:4692kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:600kB inactive_anon:244928kB active_file:56kB inactive_file:164kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:5552kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1724.011214] lowmem_reserve[]: 0 0 0 0 [ 1724.011596] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6512kB [ 1724.012930] Node 0 DMA32: 616*4kB (UME) 183*8kB (UME) 67*16kB (UME) 15*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5544kB [ 1724.014359] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1724.015171] 176 total pagecache pages [ 1724.015540] 0 pages in swap cache [ 1724.015873] Swap cache stats: add 0, delete 0, find 0/0 [ 1724.016413] Free swap = 0kB [ 1724.016710] Total swap = 0kB [ 1724.017026] 524158 pages RAM [ 1724.017336] 0 pages HighMem/MovableOnly [ 1724.017701] 105064 pages reserved [ 1724.018068] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz7,mems_allowed=0,global_oom,task_memcg=/syz7,task=syz-executor.7,pid=287,uid=0 [ 1724.019628] Out of memory (oom_kill_allocating_task): Killed process 287 (syz-executor.7) total-vm:93280kB, anon-rss:388kB, file-rss:34536kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:0 [ 1724.137719] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1724.139914] CPU: 1 PID: 263 Comm: syz-fuzzer Not tainted 5.10.224 #1 [ 1724.141334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1724.143139] Call Trace: [ 1724.143704] dump_stack+0x107/0x167 [ 1724.144491] dump_header+0x106/0x655 [ 1724.145331] oom_kill_process.cold+0x10/0x15 [ 1724.146285] out_of_memory+0x1149/0x1440 [ 1724.147167] ? oom_killer_disable+0x280/0x280 [ 1724.148143] ? mutex_trylock+0x237/0x2b0 [ 1724.149017] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1724.150334] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1724.151615] ? lock_acquire+0x107/0x470 [ 1724.152491] ? warn_alloc+0x190/0x190 [ 1724.153363] __alloc_pages_nodemask+0x51d/0x600 [ 1724.154371] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1724.155668] ? find_get_entry+0x2c8/0x740 [ 1724.156569] alloc_pages_current+0x187/0x280 [ 1724.157555] __page_cache_alloc+0x2d2/0x360 [ 1724.158493] pagecache_get_page+0x2c7/0xc80 [ 1724.159427] filemap_fault+0x177d/0x2210 [ 1724.160317] ? read_cache_page_gfp+0x30/0x30 [ 1724.161304] ? replace_page_cache_page+0x1200/0x1200 [ 1724.162403] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1724.163536] ext4_filemap_fault+0x87/0xc0 [ 1724.164430] __do_fault+0x113/0x410 [ 1724.165250] handle_mm_fault+0x1e53/0x3500 [ 1724.166171] ? ep_read_events_proc+0x3d0/0x3d0 [ 1724.167157] ? __pmd_alloc+0x5e0/0x5e0 [ 1724.168002] ? vmacache_find+0x55/0x2a0 [ 1724.168863] do_user_addr_fault+0x56e/0xc60 [ 1724.169831] exc_page_fault+0xa2/0x1a0 [ 1724.170669] ? asm_exc_page_fault+0x8/0x30 [ 1724.171584] asm_exc_page_fault+0x1e/0x30 [ 1724.172471] RIP: 0033:0x4666e0 [ 1724.173187] Code: Unable to access opcode bytes at RIP 0x4666b6. [ 1724.174500] RSP: 002b:000000c0006877f0 EFLAGS: 00010246 [ 1724.175649] RAX: 0000000000000000 RBX: 00000000000003b6 RCX: 00000000004666e0 [ 1724.177223] RDX: 0000000000000080 RSI: 000000c000687840 RDI: 0000000000000003 [ 1724.178774] RBP: 000000c000687e40 R08: 0000000000000000 R09: 0000000000000000 [ 1724.180314] R10: 00000000000003b6 R11: 0000000000000246 R12: 0000000000000003 [ 1724.181887] R13: 000000c000082d80 R14: 0000019c3bcda8e5 R15: 0000000000000200 [ 1724.184184] Mem-Info: [ 1724.184826] active_anon:150 inactive_anon:61094 isolated_anon:0 [ 1724.184826] active_file:19 inactive_file:17 isolated_file:0 [ 1724.184826] unevictable:0 dirty:0 writeback:0 [ 1724.184826] slab_reclaimable:8401 slab_unreclaimable:60664 [ 1724.184826] mapped:69634 shmem:117 pagetables:1214 bounce:0 [ 1724.184826] free:2825 free_pcp:410 free_cma:0 [ 1724.191694] Node 0 active_anon:600kB inactive_anon:244376kB active_file:76kB inactive_file:68kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278536kB dirty:0kB writeback:0kB shmem:468kB writeback_tmp:0kB kernel_stack:4064kB all_unreclaimable? no [ 1724.196650] Node 0 DMA free:6512kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1724.202336] lowmem_reserve[]: 0 1616 1616 1616 [ 1724.203373] Node 0 DMA32 free:4788kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:600kB inactive_anon:244376kB active_file:0kB inactive_file:160kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:4856kB bounce:0kB free_pcp:1644kB local_pcp:432kB free_cma:0kB [ 1724.209605] lowmem_reserve[]: 0 0 0 0 [ 1724.210473] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6512kB [ 1724.213353] Node 0 DMA32: 513*4kB (UME) 177*8kB (UME) 63*16kB (UME) 10*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4796kB [ 1724.216326] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1724.218210] 157 total pagecache pages [ 1724.219034] 0 pages in swap cache [ 1724.219800] Swap cache stats: add 0, delete 0, find 0/0 [ 1724.220972] Free swap = 0kB [ 1724.221681] Total swap = 0kB [ 1724.222354] 524158 pages RAM [ 1724.223009] 0 pages HighMem/MovableOnly [ 1724.223882] 105064 pages reserved [ 1724.224644] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=263,uid=0 [ 1724.228315] Out of memory (oom_kill_allocating_task): Killed process 254 (syz-fuzzer) total-vm:1237324kB, anon-rss:208992kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:880kB oom_score_adj:0 [ 1724.275853] syz-executor.3 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1724.278134] CPU: 1 PID: 288 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 1724.279598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1724.281437] Call Trace: [ 1724.282002] dump_stack+0x107/0x167 [ 1724.282798] dump_header+0x106/0x655 [ 1724.283603] oom_kill_process.cold+0x10/0x15 [ 1724.284551] out_of_memory+0x1149/0x1440 [ 1724.285470] ? oom_killer_disable+0x280/0x280 [ 1724.286441] ? mutex_trylock+0x237/0x2b0 [ 1724.287317] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1724.288593] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1724.289899] ? lock_acquire+0x107/0x470 [ 1724.290763] ? warn_alloc+0x190/0x190 [ 1724.291597] __alloc_pages_nodemask+0x51d/0x600 [ 1724.292615] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1724.293944] ? find_get_entry+0x2c8/0x740 [ 1724.294843] alloc_pages_current+0x187/0x280 [ 1724.295794] __page_cache_alloc+0x2d2/0x360 [ 1724.296726] pagecache_get_page+0x2c7/0xc80 [ 1724.297690] filemap_fault+0x177d/0x2210 [ 1724.298574] ? read_cache_page_gfp+0x30/0x30 [ 1724.299524] ? replace_page_cache_page+0x1200/0x1200 [ 1724.300617] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1724.301786] ext4_filemap_fault+0x87/0xc0 [ 1724.302683] __do_fault+0x113/0x410 [ 1724.303472] handle_mm_fault+0x1e53/0x3500 [ 1724.304393] ? __pmd_alloc+0x5e0/0x5e0 [ 1724.305272] ? vmacache_find+0x55/0x2a0 [ 1724.306135] do_user_addr_fault+0x56e/0xc60 [ 1724.307076] exc_page_fault+0xa2/0x1a0 [ 1724.307914] ? asm_exc_page_fault+0x8/0x30 [ 1724.308828] asm_exc_page_fault+0x1e/0x30 [ 1724.309748] RIP: 0033:0x7f23f04fa688 [ 1724.310556] Code: Unable to access opcode bytes at RIP 0x7f23f04fa65e. [ 1724.311973] RSP: 002b:00007ffedbbf77f0 EFLAGS: 00010216 [ 1724.313142] RAX: 0000001b2d320000 RBX: 0000000000000248 RCX: 00000000001a4a78 [ 1724.314706] RDX: 00000000001a4c84 RSI: 00007ffedbbf78b0 RDI: 0000000000000001 [ 1724.316253] RBP: 00007ffedbbf784c R08: 00000000000006bb R09: 00007ffedbbf9080 [ 1724.317828] R10: 00007ffedbbf9090 R11: 00000000002be3da R12: 0000000000000032 [ 1724.319371] R13: 00000000001a4428 R14: 0000000000000007 R15: 00007ffedbbf78b0 [ 1724.321000] Mem-Info: [ 1724.321599] active_anon:150 inactive_anon:61094 isolated_anon:0 [ 1724.321599] active_file:35 inactive_file:6 isolated_file:0 [ 1724.321599] unevictable:0 dirty:0 writeback:0 [ 1724.321599] slab_reclaimable:8401 slab_unreclaimable:60664 [ 1724.321599] mapped:69634 shmem:117 pagetables:1214 bounce:0 [ 1724.321599] free:2829 free_pcp:418 free_cma:0 [ 1724.328467] Node 0 active_anon:600kB inactive_anon:244376kB active_file:140kB inactive_file:24kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278536kB dirty:0kB writeback:0kB shmem:468kB writeback_tmp:0kB kernel_stack:3744kB all_unreclaimable? yes [ 1724.333480] Node 0 DMA free:6512kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1724.339170] lowmem_reserve[]: 0 1616 1616 1616 [ 1724.340223] Node 0 DMA32 free:4804kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:600kB inactive_anon:244376kB active_file:120kB inactive_file:24kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:4856kB bounce:0kB free_pcp:1684kB local_pcp:428kB free_cma:0kB [ 1724.346434] lowmem_reserve[]: 0 0 0 0 [ 1724.347296] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6512kB [ 1724.350162] Node 0 DMA32: 511*4kB (ME) 175*8kB (ME) 61*16kB (ME) 10*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4804kB [ 1724.353206] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1724.355049] 157 total pagecache pages [ 1724.355886] 0 pages in swap cache [ 1724.356650] Swap cache stats: add 0, delete 0, find 0/0 [ 1724.357846] Free swap = 0kB [ 1724.358518] Total swap = 0kB [ 1724.359171] 524158 pages RAM [ 1724.359843] 0 pages HighMem/MovableOnly [ 1724.360716] 105064 pages reserved [ 1724.361522] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0,global_oom,task_memcg=/syz3,task=syz-executor.3,pid=288,uid=0 [ 1724.364536] Out of memory (oom_kill_allocating_task): Killed process 288 (syz-executor.3) total-vm:93280kB, anon-rss:384kB, file-rss:34648kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:0 [ 1724.394451] syz-executor.3: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 1724.397441] CPU: 1 PID: 9260 Comm: syz-executor.3 Not tainted 5.10.224 #1 [ 1724.398926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1724.400724] Call Trace: [ 1724.401319] dump_stack+0x107/0x167 [ 1724.402106] warn_alloc.cold+0x95/0x18a [ 1724.402966] ? zone_watermark_ok_safe+0x260/0x260 [ 1724.404007] ? queue_oom_reaper+0x86/0x1e0 [ 1724.404930] ? wait_for_completion_io+0x270/0x270 [ 1724.406012] __alloc_pages_slowpath.constprop.0+0x1c33/0x2170 [ 1724.407284] ? lock_acquire+0x107/0x470 [ 1724.408149] ? warn_alloc+0x190/0x190 [ 1724.408988] __alloc_pages_nodemask+0x51d/0x600 [ 1724.410024] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1724.411189] ? trace_hardirqs_on+0x5b/0x180 [ 1724.412125] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1724.413449] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1724.414628] ? policy_node+0x11a/0x140 [ 1724.415470] alloc_pages_current+0x187/0x280 [ 1724.416420] relay_open_buf.part.0+0x2a5/0xc00 [ 1724.417442] relay_open+0x531/0xa10 [ 1724.418231] do_blk_trace_setup+0x4cf/0xc10 [ 1724.419163] ? _copy_from_user+0xfb/0x1b0 [ 1724.420057] __blk_trace_setup+0xca/0x180 [ 1724.420956] ? do_blk_trace_setup+0xc10/0xc10 [ 1724.421971] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1724.423105] ? slab_free_freelist_hook+0xa9/0x180 [ 1724.424143] blk_trace_setup+0x43/0x60 [ 1724.424990] sg_ioctl_common+0x634/0x2570 [ 1724.425917] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1724.427039] ? do_vfs_ioctl+0x283/0x10d0 [ 1724.427911] ? sg_write+0x120/0x120 [ 1724.428701] ? generic_block_fiemap+0x60/0x60 [ 1724.429698] ? lock_downgrade+0x6d0/0x6d0 [ 1724.430594] ? build_open_flags+0x6f0/0x6f0 [ 1724.431525] ? sockfd_lookup_light+0xca/0x180 [ 1724.432503] ? selinux_file_ioctl+0xb6/0x270 [ 1724.433481] ? sg_compat_ioctl+0x120/0x120 [ 1724.434395] sg_ioctl+0x8f/0x120 [ 1724.435124] __x64_sys_ioctl+0x19a/0x210 [ 1724.436000] do_syscall_64+0x33/0x40 [ 1724.436801] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1724.437938] RIP: 0033:0x7f23f054db19 [ 1724.438739] Code: Unable to access opcode bytes at RIP 0x7f23f054daef. [ 1724.440158] RSP: 002b:00007f23edac3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1724.441835] RAX: ffffffffffffffda RBX: 00007f23f0660f60 RCX: 00007f23f054db19 [ 1724.443383] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000004 [ 1724.444922] RBP: 00007f23f05a7f6d R08: 0000000000000000 R09: 0000000000000000 [ 1724.446493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1724.448031] R13: 00007ffedbbf759f R14: 00007f23edac3300 R15: 0000000000022000 [ 1724.449733] Mem-Info: [ 1724.450302] active_anon:150 inactive_anon:61073 isolated_anon:0 [ 1724.450302] active_file:13 inactive_file:21 isolated_file:0 [ 1724.450302] unevictable:0 dirty:0 writeback:0 [ 1724.450302] slab_reclaimable:8401 slab_unreclaimable:60664 [ 1724.450302] mapped:69634 shmem:117 pagetables:1214 bounce:0 [ 1724.450302] free:2693 free_pcp:456 free_cma:0 [ 1724.457155] Node 0 active_anon:600kB inactive_anon:244292kB active_file:52kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278536kB dirty:0kB writeback:0kB shmem:468kB writeback_tmp:0kB kernel_stack:3744kB all_unreclaimable? yes [ 1724.462139] Node 0 DMA free:6472kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1724.468512] lowmem_reserve[]: 0 1616 1616 1616 [ 1724.469657] Node 0 DMA32 free:4300kB min:9212kB low:10864kB high:12516kB reserved_highatomic:0KB active_anon:600kB inactive_anon:244292kB active_file:108kB inactive_file:76kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:4856kB bounce:0kB free_pcp:1824kB local_pcp:440kB free_cma:0kB [ 1724.475910] lowmem_reserve[]: 0 0 0 0 [ 1724.476776] Node 0 DMA: 0*4kB 1*8kB (U) 0*16kB 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6472kB [ 1724.479560] Node 0 DMA32: 465*4kB (UME) 167*8kB (UME) 57*16kB (UME) 6*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4300kB [ 1724.482536] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1724.484380] 157 total pagecache pages [ 1724.485259] 0 pages in swap cache [ 1724.486005] Swap cache stats: add 0, delete 0, find 0/0 [ 1724.487163] Free swap = 0kB [ 1724.487837] Total swap = 0kB [ 1724.488510] 524158 pages RAM [ 1724.489217] 0 pages HighMem/MovableOnly [ 1724.490076] 105064 pages reserved [ 1724.659610] blktrace: Concurrent blktraces are not allowed on sg0 [ 1725.435478] systemd-rfkill invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1725.436594] CPU: 0 PID: 9304 Comm: systemd-rfkill Not tainted 5.10.224 #1 [ 1725.437188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1725.437906] Call Trace: [ 1725.438138] dump_stack+0x107/0x167 [ 1725.438448] dump_header+0x106/0x655 [ 1725.438763] oom_kill_process.cold+0x10/0x15 [ 1725.439135] out_of_memory+0x1149/0x1440 [ 1725.439483] ? oom_killer_disable+0x280/0x280 [ 1725.439865] ? mutex_trylock+0x237/0x2b0 [ 1725.440206] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1725.440701] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1725.441238] ? lock_acquire+0x107/0x470 [ 1725.441576] ? warn_alloc+0x190/0x190 [ 1725.441911] __alloc_pages_nodemask+0x51d/0x600 [ 1725.442301] ? add_mm_counter_fast+0x220/0x220 [ 1725.442685] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1725.443189] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1725.443627] ? lock_downgrade+0x6d0/0x6d0 [ 1725.443973] ? mark_held_locks+0x9e/0xe0 [ 1725.444319] alloc_pages_vma+0xbb/0x410 [ 1725.444657] handle_mm_fault+0xf00/0x3500 [ 1725.445006] ? vm_mmap_pgoff+0x1b7/0x1f0 [ 1725.445382] ? vm_mmap_pgoff+0xe8/0x1f0 [ 1725.445718] ? __pmd_alloc+0x5e0/0x5e0 [ 1725.446051] ? vmacache_find+0x55/0x2a0 [ 1725.446393] do_user_addr_fault+0x56e/0xc60 [ 1725.446760] exc_page_fault+0xa2/0x1a0 [ 1725.447087] ? asm_exc_page_fault+0x8/0x30 [ 1725.447455] asm_exc_page_fault+0x1e/0x30 [ 1725.447814] RIP: 0033:0x7f494d1be0ef [ 1725.448128] Code: 0f 7f 44 17 f0 f3 0f 7f 07 c3 48 83 fa 40 77 16 f3 0f 7f 07 f3 0f 7f 47 10 f3 0f 7f 44 17 f0 f3 0f 7f 44 17 e0 c3 48 8d 4f 40 0f 7f 07 48 83 e1 c0 f3 0f 7f 44 17 f0 f3 0f 7f 47 10 f3 0f 7f [ 1725.449653] RSP: 002b:00007fff9b40ca58 EFLAGS: 00010206 [ 1725.450098] RAX: 00007f494ccd0008 RBX: 0000000000000004 RCX: 00007f494ccd0048 [ 1725.450690] RDX: 0000000000000ff8 RSI: 0000000000000000 RDI: 00007f494ccd0008 [ 1725.451281] RBP: 00007fff9b40cd60 R08: 00007f494ccd0008 R09: 0000000000030000 [ 1725.451872] R10: 00007f494ccd1000 R11: 0000000000000003 R12: 00007f494d19d940 [ 1725.452465] R13: 00007fff9b40ca60 R14: 00007fff9b40caf0 R15: 00007fff9b40cdf0 [ 1725.453155] Mem-Info: [ 1725.453442] active_anon:49 inactive_anon:9277 isolated_anon:0 [ 1725.453442] active_file:531 inactive_file:342 isolated_file:0 [ 1725.453442] unevictable:0 dirty:20 writeback:21 [ 1725.453442] slab_reclaimable:8147 slab_unreclaimable:58192 [ 1725.453442] mapped:9459 shmem:91 pagetables:548 bounce:0 [ 1725.453442] free:3575 free_pcp:250 free_cma:0 [ 1725.456010] Node 0 active_anon:196kB inactive_anon:37108kB active_file:2124kB inactive_file:1368kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:37836kB dirty:80kB writeback:84kB shmem:364kB writeback_tmp:0kB kernel_stack:2912kB all_unreclaimable? no [ 1725.457956] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1725.460119] lowmem_reserve[]: 0 1616 1616 1616 [ 1725.460549] Node 0 DMA32 free:7816kB min:15356kB low:17008kB high:18660kB reserved_highatomic:0KB active_anon:196kB inactive_anon:37276kB active_file:2432kB inactive_file:1264kB unevictable:0kB writepending:124kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:2192kB bounce:0kB free_pcp:1068kB local_pcp:116kB free_cma:0kB [ 1725.462999] lowmem_reserve[]: 0 0 0 0 [ 1725.463370] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 1725.464593] Node 0 DMA32: 1012*4kB (UME) 245*8kB (UME) 108*16kB (UME) 19*32kB (UME) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8408kB [ 1725.465900] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1725.466618] 970 total pagecache pages [ 1725.466939] 0 pages in swap cache [ 1725.467248] Swap cache stats: add 0, delete 0, find 0/0 [ 1725.467686] Free swap = 0kB [ 1725.467942] Total swap = 0kB [ 1725.468213] 524158 pages RAM [ 1725.468466] 0 pages HighMem/MovableOnly [ 1725.468795] 105064 pages reserved [ 1725.469136] Unreclaimable slab info: [ 1725.469767] Name Used Total [ 1725.470278] pid_3 7KB 7KB [ 1725.470724] pid_2 49KB 63KB [ 1725.471171] ip6-frags 7KB 7KB [ 1725.471636] fib6_nodes 28KB 28KB [ 1725.472080] ip6_dst_cache 48KB 48KB [ 1725.472544] RAWv6 220KB 220KB [ 1725.472987] UDPLITEv6 62KB 62KB [ 1725.473489] UDPv6 62KB 62KB [ 1725.473934] TCPv6 62KB 62KB [ 1725.474401] scsi_sense_cache 4KB 4KB [ 1725.474843] sd_ext_cdb 3KB 3KB [ 1725.475311] virtio_scsi_cmd 16KB 16KB [ 1725.475775] sgpool-128 59KB 59KB [ 1725.476249] sgpool-64 63KB 63KB [ 1725.476703] sgpool-32 173KB 173KB [ 1725.477175] sgpool-16 37KB 37KB [ 1725.477657] sgpool-8 56KB 56KB [ 1725.478099] io_kiocb 56KB 71KB [ 1725.478562] mqueue_inode_cache 62KB 62KB [ 1725.479012] nfs_commit_data 15KB 15KB [ 1725.479476] nfs_write_data 47KB 47KB [ 1725.479933] jbd2_inode 7KB 7KB [ 1725.480408] ext4_system_zone 7KB 7KB [ 1725.480862] ext4_io_end_vec 7KB 7KB [ 1725.481368] ext4_bio_post_read_ctx 15KB 15KB [ 1725.481846] kioctx 15KB 15KB [ 1725.482306] aio_kiocb 3KB 3KB [ 1725.482751] bio-2 4KB 4KB [ 1725.483210] fasync_cache 3KB 3KB [ 1725.483662] pid_namespace 7KB 7KB [ 1725.484105] rpc_buffers 31KB 31KB [ 1725.484568] rpc_tasks 3KB 3KB [ 1725.485012] UNIX 224KB 320KB [ 1725.485521] tcp_bind_bucket 8KB 8KB [ 1725.485967] ip_fib_trie 8KB 8KB [ 1725.486431] ip_fib_alias 15KB 15KB [ 1725.486873] ip_dst_cache 8KB 8KB [ 1725.487644] RAW 93KB 93KB [ 1725.488344] UDP 253KB 315KB [ 1725.488791] request_sock_TCP 15KB 15KB [ 1725.489290] TCP 60KB 60KB [ 1725.489733] hugetlbfs_inode_cache 30KB 30KB [ 1725.490221] bio-1 11KB 11KB [ 1725.490664] eventpoll_pwq 23KB 23KB [ 1725.491713] eventpoll_epi 43KB 43KB [ 1725.492532] inotify_inode_mark 93KB 93KB [ 1725.492988] request_queue 60KB 60KB [ 1725.493837] blkdev_ioc 15KB 15KB [ 1725.494416] bio-0 180KB 180KB [ 1725.494858] biovec-max 1011KB 1011KB [ 1725.495322] biovec-64 220KB 220KB [ 1725.495763] biovec-16 30KB 30KB [ 1725.496223] user_namespace 31KB 31KB [ 1725.496799] uid_cache 8KB 8KB [ 1725.497432] dmaengine-unmap-2 4KB 4KB [ 1725.497966] audit_buffer 7KB 7KB [ 1725.498524] skbuff_fclone_cache 90KB 90KB [ 1725.499080] skbuff_head_cache 656KB 656KB [ 1725.499642] file_lock_cache 51KB 51KB [ 1725.500176] file_lock_ctx 7KB 7KB [ 1725.500735] fsnotify_mark_connector 28KB 28KB [ 1725.501352] net_namespace 115KB 115KB [ 1725.501888] task_delay_info 123KB 123KB [ 1725.502450] taskstats 54KB 54KB [ 1725.502984] proc_dir_entry 506KB 506KB [ 1725.503538] pde_opener 27KB 27KB [ 1725.504273] seq_file 60KB 60KB [ 1725.504806] sigqueue 74KB 74KB [ 1725.505383] shmem_inode_cache 1256KB 1289KB [ 1725.505920] kernfs_iattrs_cache 223KB 223KB [ 1725.506571] kernfs_node_cache 5457KB 5457KB [ 1725.507222] mnt_cache 220KB 220KB [ 1725.507779] filp 990KB 1473KB [ 1725.508338] names_cache 5474KB 5584KB [ 1725.508872] hashtab_node 274KB 274KB [ 1725.509459] ebitmap_node 1149KB 1149KB [ 1725.509997] avtab_node 4976KB 4976KB [ 1725.510554] avc_node 31KB 31KB [ 1725.511114] lsm_inode_cache 2815KB 3182KB [ 1725.511673] lsm_file_cache 65KB 160KB [ 1725.512222] key_jar 39KB 39KB [ 1725.512753] uts_namespace 15KB 15KB [ 1725.513390] nsproxy 7KB 7KB [ 1725.514025] vm_area_struct 880KB 1100KB [ 1725.514581] fs_cache 64KB 64KB [ 1725.515112] files_cache 109KB 175KB [ 1725.515673] signal_cache 331KB 432KB [ 1725.516227] sighand_cache 360KB 360KB [ 1725.516768] task_struct 1010KB 1365KB [ 1725.517345] cred_jar 102KB 164KB [ 1725.517881] anon_vma_chain 263KB 263KB [ 1725.518438] anon_vma 159KB 215KB [ 1725.518980] pid 73KB 82KB [ 1725.519538] Acpi-Operand 120KB 154KB [ 1725.520073] Acpi-ParseExt 27KB 27KB [ 1725.520628] Acpi-Parse 146KB 162KB [ 1725.521187] Acpi-State 129KB 145KB [ 1725.521751] Acpi-Namespace 24KB 24KB [ 1725.522306] shared_policy_node 8KB 8KB [ 1725.522849] numa_policy 7KB 7KB [ 1725.523454] trace_event_file 176KB 176KB [ 1725.524133] ftrace_event_field 280KB 280KB [ 1725.524699] pool_workqueue 40KB 40KB [ 1725.525453] task_group 16KB 16KB [ 1725.525993] mm_struct 304KB 378KB [ 1725.526551] vmap_area 169KB 212KB [ 1725.527090] page->ptl 221KB 232KB [ 1725.527671] kmemleak_scan_area 31KB 87KB [ 1725.529504] kmemleak_object 135194KB 152178KB [ 1725.530033] kmalloc-8k 4912KB 5056KB [ 1725.530597] kmalloc-4k 7584KB 7936KB [ 1725.531329] kmalloc-2k 4736KB 4832KB [ 1725.531874] kmalloc-1k 2624KB 3360KB [ 1725.532453] kmalloc-512 3487KB 4816KB [ 1725.532988] kmalloc-256 1368KB 1368KB [ 1725.533539] kmalloc-192 536KB 536KB [ 1725.534098] kmalloc-128 494KB 536KB [ 1725.534683] kmalloc-96 370KB 644KB [ 1725.535269] kmalloc-64 971KB 1220KB [ 1725.535835] kmalloc-32 788KB 940KB [ 1725.536401] kmalloc-16 364KB 364KB [ 1725.536951] kmalloc-8 318KB 318KB [ 1725.537522] kmem_cache_node 47KB 47KB [ 1725.538074] kmem_cache 75KB 75KB [ 1725.538643] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-rfkill.service,task=systemd-rfkill,pid=9304,uid=0 [ 1725.541002] Out of memory (oom_kill_allocating_task): Killed process 9304 (systemd-rfkill) total-vm:5480kB, anon-rss:76kB, file-rss:60kB, shmem-rss:0kB, UID:0 pgtables:44kB oom_score_adj:0 [ 1725.825842] sshd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1725.826833] CPU: 0 PID: 248 Comm: sshd Not tainted 5.10.224 #1 [ 1725.827435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1725.828250] Call Trace: [ 1725.828535] dump_stack+0x107/0x167 [ 1725.828920] dump_header+0x106/0x655 [ 1725.829316] oom_kill_process.cold+0x10/0x15 [ 1725.829759] out_of_memory+0x1149/0x1440 [ 1725.830180] ? oom_killer_disable+0x280/0x280 [ 1725.830638] ? mutex_trylock+0x237/0x2b0 [ 1725.831046] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1725.831639] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1725.832232] ? lock_acquire+0x107/0x470 [ 1725.832651] ? warn_alloc+0x190/0x190 [ 1725.833053] __alloc_pages_nodemask+0x51d/0x600 [ 1725.833543] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1725.834134] ? find_get_entry+0x2c8/0x740 [ 1725.834548] alloc_pages_current+0x187/0x280 [ 1725.834971] __page_cache_alloc+0x2d2/0x360 [ 1725.835436] pagecache_get_page+0x2c7/0xc80 [ 1725.835873] filemap_fault+0x177d/0x2210 [ 1725.836285] ? read_cache_page_gfp+0x30/0x30 [ 1725.836720] ? replace_page_cache_page+0x1200/0x1200 [ 1725.837234] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1725.837783] ext4_filemap_fault+0x87/0xc0 [ 1725.838224] __do_fault+0x113/0x410 [ 1725.838594] handle_mm_fault+0x1e53/0x3500 [ 1725.839018] ? fsnotify+0x1560/0x1560 [ 1725.839387] ? find_held_lock+0x2c/0x110 [ 1725.839755] ? __pmd_alloc+0x5e0/0x5e0 [ 1725.840147] ? vmacache_find+0x55/0x2a0 [ 1725.840523] do_user_addr_fault+0x56e/0xc60 [ 1725.840933] exc_page_fault+0xa2/0x1a0 [ 1725.841797] ? asm_exc_page_fault+0x8/0x30 [ 1725.842515] asm_exc_page_fault+0x1e/0x30 [ 1725.843213] RIP: 0033:0x7fa25a94c4be [ 1725.843842] Code: Unable to access opcode bytes at RIP 0x7fa25a94c494. [ 1725.844961] RSP: 002b:00007fff9f9a9810 EFLAGS: 00010206 [ 1725.845509] RAX: 000000000000001f RBX: 0000563cb18122d0 RCX: 0000563cb18274df [ 1725.846102] RDX: 000000000000001f RSI: 0000563cb18274c0 RDI: 0000563cb1812300 [ 1725.846693] RBP: 0000563cb1812300 R08: 000000000000000a R09: 00007fa25af0cbe0 [ 1725.847283] R10: 0000000000000010 R11: 0000000000000246 R12: 0000563cb1818f80 [ 1725.847989] R13: 00007fa25a95a6f8 R14: 0000000000000400 R15: 0000000000000400 [ 1725.848683] Mem-Info: [ 1725.848911] active_anon:49 inactive_anon:7597 isolated_anon:0 [ 1725.848911] active_file:18 inactive_file:70 isolated_file:0 [ 1725.848911] unevictable:0 dirty:0 writeback:21 [ 1725.848911] slab_reclaimable:7652 slab_unreclaimable:58100 [ 1725.848911] mapped:8724 shmem:91 pagetables:360 bounce:0 [ 1725.848911] free:3115 free_pcp:43 free_cma:0 [ 1725.851665] Node 0 active_anon:196kB inactive_anon:30388kB active_file:72kB inactive_file:280kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34896kB dirty:0kB writeback:84kB shmem:364kB writeback_tmp:0kB kernel_stack:2848kB all_unreclaimable? no [ 1725.853774] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1725.856144] lowmem_reserve[]: 0 1616 1616 1616 [ 1725.856572] Node 0 DMA32 free:4264kB min:9212kB low:10864kB high:12516kB reserved_highatomic:0KB active_anon:196kB inactive_anon:30724kB active_file:156kB inactive_file:732kB unevictable:0kB writepending:124kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:1440kB bounce:0kB free_pcp:524kB local_pcp:0kB free_cma:0kB [ 1725.858958] lowmem_reserve[]: 0 0 0 0 [ 1725.859317] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 1725.860476] Node 0 DMA32: 433*4kB (ME) 145*8kB (ME) 72*16kB (UME) 20*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4684kB [ 1725.861683] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1725.862396] 235 total pagecache pages [ 1725.862712] 0 pages in swap cache [ 1725.863000] Swap cache stats: add 0, delete 0, find 0/0 [ 1725.863457] Free swap = 0kB [ 1725.863710] Total swap = 0kB [ 1725.863962] 524158 pages RAM [ 1725.864232] 0 pages HighMem/MovableOnly [ 1725.864560] 105064 pages reserved [ 1725.864874] Unreclaimable slab info: [ 1725.865397] Name Used Total [ 1725.865880] pid_3 7KB 7KB [ 1725.866350] pid_2 49KB 63KB [ 1725.866797] ip6-frags 7KB 7KB [ 1725.867258] fib6_nodes 28KB 28KB [ 1725.867700] ip6_dst_cache 48KB 48KB [ 1725.868142] RAWv6 220KB 220KB [ 1725.868603] UDPLITEv6 62KB 62KB [ 1725.869045] UDPv6 62KB 62KB [ 1725.869540] TCPv6 62KB 62KB [ 1725.869989] scsi_sense_cache 4KB 4KB [ 1725.870451] sd_ext_cdb 3KB 3KB [ 1725.870895] virtio_scsi_cmd 16KB 16KB [ 1725.871364] sgpool-128 59KB 59KB [ 1725.871807] sgpool-64 63KB 63KB [ 1725.872267] sgpool-32 252KB 252KB [ 1725.872709] sgpool-16 82KB 82KB [ 1725.873162] sgpool-8 56KB 56KB [ 1725.873628] io_kiocb 56KB 71KB [ 1725.874071] mqueue_inode_cache 62KB 62KB [ 1725.874540] nfs_commit_data 15KB 15KB [ 1725.874983] nfs_write_data 47KB 47KB [ 1725.875447] jbd2_inode 7KB 7KB [ 1725.875889] ext4_system_zone 7KB 7KB [ 1725.876349] ext4_io_end_vec 7KB 7KB [ 1725.876793] ext4_bio_post_read_ctx 15KB 15KB [ 1725.877307] kioctx 15KB 15KB [ 1725.877749] aio_kiocb 3KB 3KB [ 1725.878214] bio-2 4KB 4KB [ 1725.878657] fasync_cache 3KB 3KB [ 1725.879100] pid_namespace 7KB 7KB [ 1725.879562] rpc_buffers 31KB 31KB [ 1725.880004] rpc_tasks 3KB 3KB [ 1725.880466] UNIX 224KB 320KB [ 1725.880911] tcp_bind_bucket 8KB 8KB [ 1725.881391] ip_fib_trie 8KB 8KB [ 1725.881834] ip_fib_alias 15KB 15KB [ 1725.882295] ip_dst_cache 8KB 8KB [ 1725.882738] RAW 93KB 93KB [ 1725.883182] UDP 253KB 315KB [ 1725.883644] request_sock_TCP 15KB 15KB [ 1725.884086] TCP 60KB 60KB [ 1725.884547] hugetlbfs_inode_cache 30KB 30KB [ 1725.885018] bio-1 11KB 11KB [ 1725.885500] eventpoll_pwq 23KB 23KB [ 1725.885945] eventpoll_epi 43KB 43KB [ 1725.886413] inotify_inode_mark 93KB 93KB [ 1725.886864] request_queue 60KB 60KB [ 1725.887327] blkdev_ioc 15KB 15KB [ 1725.887771] bio-0 272KB 272KB [ 1725.888239] biovec-max 786KB 952KB [ 1725.888683] biovec-64 346KB 346KB [ 1725.889135] biovec-16 52KB 52KB [ 1725.889605] user_namespace 31KB 31KB [ 1725.890047] uid_cache 8KB 8KB [ 1725.890510] dmaengine-unmap-2 4KB 4KB [ 1725.890953] audit_buffer 7KB 7KB [ 1725.891415] skbuff_fclone_cache 90KB 90KB [ 1725.891873] skbuff_head_cache 671KB 671KB [ 1725.892334] file_lock_cache 51KB 51KB [ 1725.892777] file_lock_ctx 7KB 7KB [ 1725.893253] fsnotify_mark_connector 28KB 28KB [ 1725.893738] net_namespace 115KB 115KB [ 1725.894182] task_delay_info 123KB 123KB [ 1725.894643] taskstats 54KB 54KB [ 1725.895085] proc_dir_entry 506KB 506KB [ 1725.895548] pde_opener 27KB 27KB [ 1725.895991] seq_file 60KB 60KB [ 1725.896453] sigqueue 74KB 74KB [ 1725.896897] shmem_inode_cache 1256KB 1289KB [ 1725.897379] kernfs_iattrs_cache 223KB 223KB [ 1725.897836] kernfs_node_cache 5457KB 5457KB [ 1725.898299] mnt_cache 220KB 220KB [ 1725.898762] filp 948KB 1436KB [ 1725.899228] names_cache 4802KB 5525KB [ 1725.899673] hashtab_node 274KB 274KB [ 1725.900116] ebitmap_node 1149KB 1149KB [ 1725.900581] avtab_node 4976KB 4976KB [ 1725.901250] avc_node 31KB 31KB [ 1725.901728] lsm_inode_cache 2726KB 3067KB [ 1725.902176] lsm_file_cache 65KB 160KB [ 1725.902641] key_jar 39KB 39KB [ 1725.903084] uts_namespace 15KB 15KB [ 1725.903545] nsproxy 7KB 7KB [ 1725.904011] vm_area_struct 882KB 1100KB [ 1725.904473] fs_cache 64KB 64KB [ 1725.904917] files_cache 109KB 175KB [ 1725.905412] signal_cache 331KB 432KB [ 1725.905866] sighand_cache 360KB 360KB [ 1725.906336] task_struct 1010KB 1365KB [ 1725.906781] cred_jar 102KB 164KB [ 1725.907240] anon_vma_chain 263KB 263KB [ 1725.907686] anon_vma 156KB 211KB [ 1725.908128] pid 73KB 82KB [ 1725.908591] Acpi-Operand 120KB 154KB [ 1725.909032] Acpi-ParseExt 27KB 27KB [ 1725.909512] Acpi-Parse 146KB 162KB [ 1725.909953] Acpi-State 129KB 145KB [ 1725.910412] Acpi-Namespace 24KB 24KB [ 1725.910853] shared_policy_node 8KB 8KB [ 1725.911320] numa_policy 7KB 7KB [ 1725.911760] trace_event_file 176KB 176KB [ 1725.912219] ftrace_event_field 280KB 280KB [ 1725.912667] pool_workqueue 40KB 40KB [ 1725.913115] task_group 16KB 16KB [ 1725.913586] mm_struct 304KB 378KB [ 1725.914030] vmap_area 169KB 212KB [ 1725.914492] page->ptl 221KB 232KB [ 1725.914936] kmemleak_scan_area 31KB 87KB [ 1725.916448] kmemleak_object 132993KB 152049KB [ 1725.916906] kmalloc-8k 4912KB 5056KB [ 1725.917385] kmalloc-4k 7800KB 7936KB [ 1725.917828] kmalloc-2k 4800KB 4832KB [ 1725.918295] kmalloc-1k 2672KB 3360KB [ 1725.918759] kmalloc-512 3540KB 4784KB [ 1725.919219] kmalloc-256 1368KB 1368KB [ 1725.919660] kmalloc-192 540KB 540KB [ 1725.920109] kmalloc-128 494KB 536KB [ 1725.920589] kmalloc-96 374KB 636KB [ 1725.921051] kmalloc-64 970KB 1220KB [ 1725.921542] kmalloc-32 787KB 940KB [ 1725.921984] kmalloc-16 364KB 364KB [ 1725.922444] kmalloc-8 318KB 318KB [ 1725.922886] kmem_cache_node 47KB 47KB [ 1725.923351] kmem_cache 75KB 75KB [ 1725.923794] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=sshd,pid=248,uid=0 [ 1725.925060] Out of memory (oom_kill_allocating_task): Killed process 248 (sshd) total-vm:13808kB, anon-rss:1280kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 1726.094762] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 1726.095684] CPU: 0 PID: 103 Comm: systemd-journal Not tainted 5.10.224 #1 [ 1726.096262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1726.096959] Call Trace: [ 1726.097200] dump_stack+0x107/0x167 [ 1726.097516] dump_header+0x106/0x655 [ 1726.097839] oom_kill_process.cold+0x10/0x15 [ 1726.098217] out_of_memory+0x1149/0x1440 [ 1726.098571] ? oom_killer_disable+0x280/0x280 [ 1726.098957] ? mutex_trylock+0x237/0x2b0 [ 1726.099305] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1726.099810] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1726.100317] ? lock_acquire+0x107/0x470 [ 1726.100660] ? warn_alloc+0x190/0x190 [ 1726.101002] __alloc_pages_nodemask+0x51d/0x600 [ 1726.101417] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1726.101929] ? find_get_entry+0x2c8/0x740 [ 1726.102292] alloc_pages_current+0x187/0x280 [ 1726.102668] __page_cache_alloc+0x2d2/0x360 [ 1726.103040] pagecache_get_page+0x2c7/0xc80 [ 1726.103413] filemap_fault+0x177d/0x2210 [ 1726.103767] ? read_cache_page_gfp+0x30/0x30 [ 1726.104145] ? replace_page_cache_page+0x1200/0x1200 [ 1726.104576] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1726.105028] ext4_filemap_fault+0x87/0xc0 [ 1726.105395] __do_fault+0x113/0x410 [ 1726.105713] handle_mm_fault+0x1e53/0x3500 [ 1726.106077] ? find_held_lock+0x2c/0x110 [ 1726.106427] ? __pmd_alloc+0x5e0/0x5e0 [ 1726.106766] ? vmacache_find+0x55/0x2a0 [ 1726.107105] ? vmacache_update+0xce/0x140 [ 1726.107465] do_user_addr_fault+0x56e/0xc60 [ 1726.107839] exc_page_fault+0xa2/0x1a0 [ 1726.108172] ? asm_exc_page_fault+0x8/0x30 [ 1726.108533] asm_exc_page_fault+0x1e/0x30 [ 1726.108883] RIP: 0033:0x7f349b5fe6e4 [ 1726.109215] Code: Unable to access opcode bytes at RIP 0x7f349b5fe6ba. [ 1726.109768] RSP: 002b:00007ffd3de6d020 EFLAGS: 00010202 [ 1726.110221] RAX: 0000000000000000 RBX: 0000556e36b51280 RCX: 0000000000000000 [ 1726.110824] RDX: 00007f349b438000 RSI: 000000000000001b RDI: 0000556e36b5d2c0 [ 1726.111427] RBP: 0000556e36b5d2c0 R08: 0000556e36b51280 R09: 00000000005218b0 [ 1726.112031] R10: 0000000000000002 R11: 00000000002bf30c R12: 000000000000001b [ 1726.112635] R13: 000000000002db00 R14: 0000000000000000 R15: 00007ffd3de6d078 [ 1726.113437] Mem-Info: [ 1726.113667] active_anon:37 inactive_anon:7270 isolated_anon:0 [ 1726.113667] active_file:19 inactive_file:0 isolated_file:0 [ 1726.113667] unevictable:0 dirty:0 writeback:0 [ 1726.113667] slab_reclaimable:7628 slab_unreclaimable:58099 [ 1726.113667] mapped:8706 shmem:87 pagetables:287 bounce:0 [ 1726.113667] free:2423 free_pcp:62 free_cma:0 [ 1726.116239] Node 0 active_anon:148kB inactive_anon:29080kB active_file:76kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34824kB dirty:0kB writeback:0kB shmem:348kB writeback_tmp:0kB kernel_stack:2816kB all_unreclaimable? no [ 1726.118149] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1726.120348] lowmem_reserve[]: 0 1616 1616 1616 [ 1726.120759] Node 0 DMA32 free:3208kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:148kB inactive_anon:29332kB active_file:128kB inactive_file:112kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:1148kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 1726.123160] lowmem_reserve[]: 0 0 0 0 [ 1726.123525] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 1726.124705] Node 0 DMA32: 458*4kB (UME) 87*8kB (UME) 45*16kB (UME) 4*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3376kB [ 1726.125932] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1726.126658] 126 total pagecache pages [ 1726.126979] 0 pages in swap cache [ 1726.127292] Swap cache stats: add 0, delete 0, find 0/0 [ 1726.127738] Free swap = 0kB [ 1726.127995] Total swap = 0kB [ 1726.128271] 524158 pages RAM [ 1726.128527] 0 pages HighMem/MovableOnly [ 1726.128861] 105064 pages reserved [ 1726.129166] Unreclaimable slab info: [ 1726.129505] Name Used Total [ 1726.129970] pid_3 7KB 7KB [ 1726.130441] pid_2 49KB 63KB [ 1726.130893] ip6-frags 7KB 7KB [ 1726.131362] fib6_nodes 28KB 28KB [ 1726.131811] ip6_dst_cache 48KB 48KB [ 1726.132280] RAWv6 220KB 220KB [ 1726.132730] UDPLITEv6 62KB 62KB [ 1726.133405] UDPv6 62KB 62KB [ 1726.133859] TCPv6 62KB 62KB [ 1726.134332] scsi_sense_cache 4KB 4KB [ 1726.134781] sd_ext_cdb 3KB 3KB [ 1726.135249] virtio_scsi_cmd 16KB 16KB [ 1726.135703] sgpool-128 59KB 59KB [ 1726.136153] sgpool-64 63KB 63KB [ 1726.136623] sgpool-32 252KB 252KB [ 1726.137073] sgpool-16 82KB 82KB [ 1726.137560] sgpool-8 56KB 56KB [ 1726.138011] io_kiocb 56KB 71KB [ 1726.138498] mqueue_inode_cache 62KB 62KB [ 1726.138956] nfs_commit_data 15KB 15KB [ 1726.139426] nfs_write_data 47KB 47KB [ 1726.139877] jbd2_inode 7KB 7KB [ 1726.140346] ext4_system_zone 7KB 7KB [ 1726.140797] ext4_io_end_vec 7KB 7KB [ 1726.141279] ext4_bio_post_read_ctx 15KB 15KB [ 1726.141764] kioctx 15KB 15KB [ 1726.142233] aio_kiocb 3KB 3KB [ 1726.142684] bio-2 4KB 4KB [ 1726.143133] fasync_cache 3KB 3KB [ 1726.143603] pid_namespace 7KB 7KB [ 1726.144053] rpc_buffers 31KB 31KB [ 1726.144527] rpc_tasks 3KB 3KB [ 1726.144982] UNIX 224KB 320KB [ 1726.145533] tcp_bind_bucket 8KB 8KB [ 1726.145984] ip_fib_trie 8KB 8KB [ 1726.146452] ip_fib_alias 15KB 15KB [ 1726.146898] ip_dst_cache 8KB 8KB [ 1726.147364] RAW 93KB 93KB [ 1726.147815] UDP 253KB 315KB [ 1726.148280] request_sock_TCP 15KB 15KB [ 1726.148727] TCP 60KB 60KB [ 1726.149205] hugetlbfs_inode_cache 30KB 30KB [ 1726.149682] bio-1 11KB 11KB [ 1726.150127] eventpoll_pwq 23KB 23KB [ 1726.150592] eventpoll_epi 43KB 43KB [ 1726.151039] inotify_inode_mark 93KB 93KB [ 1726.151511] request_queue 60KB 60KB [ 1726.151957] blkdev_ioc 15KB 15KB [ 1726.152422] bio-0 272KB 272KB [ 1726.152870] biovec-max 786KB 952KB [ 1726.153352] biovec-64 346KB 346KB [ 1726.153800] biovec-16 52KB 52KB [ 1726.154265] user_namespace 31KB 31KB [ 1726.154712] uid_cache 8KB 8KB [ 1726.155158] dmaengine-unmap-2 4KB 4KB [ 1726.155624] audit_buffer 7KB 7KB [ 1726.156070] skbuff_fclone_cache 90KB 90KB [ 1726.156550] skbuff_head_cache 682KB 682KB [ 1726.156996] file_lock_cache 51KB 51KB [ 1726.157479] file_lock_ctx 7KB 7KB [ 1726.157927] fsnotify_mark_connector 28KB 28KB [ 1726.158434] net_namespace 115KB 115KB [ 1726.158881] task_delay_info 123KB 123KB [ 1726.159346] taskstats 54KB 54KB [ 1726.159792] proc_dir_entry 506KB 506KB [ 1726.160258] pde_opener 27KB 27KB [ 1726.160705] seq_file 60KB 60KB [ 1726.161160] sigqueue 74KB 74KB [ 1726.161629] shmem_inode_cache 1256KB 1289KB [ 1726.162076] kernfs_iattrs_cache 223KB 223KB [ 1726.162556] kernfs_node_cache 5457KB 5457KB [ 1726.163003] mnt_cache 220KB 220KB [ 1726.163471] filp 948KB 1436KB [ 1726.163919] names_cache 4802KB 5525KB [ 1726.164385] hashtab_node 274KB 274KB [ 1726.164832] ebitmap_node 1149KB 1149KB [ 1726.165317] avtab_node 4976KB 4976KB [ 1726.165767] avc_node 31KB 31KB [ 1726.166238] lsm_inode_cache 2726KB 3067KB [ 1726.166687] lsm_file_cache 65KB 160KB [ 1726.167133] key_jar 39KB 39KB [ 1726.167601] uts_namespace 15KB 15KB [ 1726.168047] nsproxy 7KB 7KB [ 1726.168515] vm_area_struct 882KB 1100KB [ 1726.168962] fs_cache 64KB 64KB [ 1726.169462] files_cache 109KB 175KB [ 1726.169911] signal_cache 331KB 432KB [ 1726.170378] sighand_cache 360KB 360KB [ 1726.170825] task_struct 1010KB 1365KB [ 1726.171292] cred_jar 102KB 164KB [ 1726.171739] anon_vma_chain 263KB 263KB [ 1726.172206] anon_vma 154KB 211KB [ 1726.172653] pid 73KB 82KB [ 1726.173100] Acpi-Operand 120KB 154KB [ 1726.173582] Acpi-ParseExt 27KB 27KB [ 1726.174030] Acpi-Parse 146KB 162KB [ 1726.174497] Acpi-State 129KB 145KB [ 1726.174944] Acpi-Namespace 24KB 24KB [ 1726.175411] shared_policy_node 8KB 8KB [ 1726.175865] numa_policy 7KB 7KB [ 1726.176331] trace_event_file 176KB 176KB [ 1726.176778] ftrace_event_field 280KB 280KB [ 1726.177264] pool_workqueue 40KB 40KB [ 1726.177711] task_group 16KB 16KB [ 1726.178158] mm_struct 304KB 378KB [ 1726.178625] vmap_area 169KB 212KB [ 1726.179072] page->ptl 221KB 232KB [ 1726.179538] kmemleak_scan_area 31KB 87KB [ 1726.180086] kmemleak_object 133022KB 152049KB [ 1726.180564] kmalloc-8k 4912KB 5056KB [ 1726.181012] kmalloc-4k 7816KB 7936KB [ 1726.181503] kmalloc-2k 4800KB 4832KB [ 1726.181953] kmalloc-1k 2700KB 3360KB [ 1726.182422] kmalloc-512 3553KB 4784KB [ 1726.182870] kmalloc-256 1368KB 1368KB [ 1726.183336] kmalloc-192 540KB 540KB [ 1726.183785] kmalloc-128 494KB 536KB [ 1726.184253] kmalloc-96 374KB 636KB [ 1726.184702] kmalloc-64 970KB 1220KB [ 1726.185163] kmalloc-32 787KB 940KB [ 1726.185632] kmalloc-16 364KB 364KB [ 1726.186079] kmalloc-8 318KB 318KB [ 1726.186546] kmem_cache_node 47KB 47KB [ 1726.186993] kmem_cache 75KB 75KB [ 1726.187459] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=103,uid=0 [ 1726.189095] Out of memory (oom_kill_allocating_task): Killed process 103 (systemd-journal) total-vm:31836kB, anon-rss:980kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:88kB oom_score_adj:-250 [ 1726.216993] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1726.217849] CPU: 0 PID: 178 Comm: in:imklog Not tainted 5.10.224 #1 [ 1726.218376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1726.219064] Call Trace: [ 1726.219289] dump_stack+0x107/0x167 [ 1726.219598] dump_header+0x106/0x655 [ 1726.219914] oom_kill_process.cold+0x10/0x15 [ 1726.220288] out_of_memory+0x1149/0x1440 [ 1726.220637] ? oom_killer_disable+0x280/0x280 [ 1726.221017] ? mutex_trylock+0x237/0x2b0 [ 1726.221375] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 1726.221874] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 1726.222374] ? lock_acquire+0x107/0x470 [ 1726.222713] ? warn_alloc+0x190/0x190 [ 1726.223049] __alloc_pages_nodemask+0x51d/0x600 [ 1726.223444] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1726.223948] ? find_get_entry+0x2c8/0x740 [ 1726.224306] alloc_pages_current+0x187/0x280 [ 1726.224678] __page_cache_alloc+0x2d2/0x360 [ 1726.225045] pagecache_get_page+0x2c7/0xc80 [ 1726.225429] filemap_fault+0x177d/0x2210 [ 1726.225779] ? read_cache_page_gfp+0x30/0x30 [ 1726.226152] ? replace_page_cache_page+0x1200/0x1200 [ 1726.226577] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1726.227022] ext4_filemap_fault+0x87/0xc0 [ 1726.227372] __do_fault+0x113/0x410 [ 1726.227683] handle_mm_fault+0x1e53/0x3500 [ 1726.228042] ? find_held_lock+0x2c/0x110 [ 1726.228387] ? __pmd_alloc+0x5e0/0x5e0 [ 1726.228721] ? vmacache_find+0x55/0x2a0 [ 1726.229063] do_user_addr_fault+0x56e/0xc60 [ 1726.229444] exc_page_fault+0xa2/0x1a0 [ 1726.229772] ? asm_exc_page_fault+0x8/0x30 [ 1726.230128] asm_exc_page_fault+0x1e/0x30 [ 1726.230474] RIP: 0033:0x7f301e447488 [ 1726.230787] Code: Unable to access opcode bytes at RIP 0x7f301e44745e. [ 1726.231334] RSP: 002b:00007f301df5e3e0 EFLAGS: 00010203 [ 1726.231782] RAX: 00007f301df7f5c8 RBX: 00007f301df5e40c RCX: 0000000000000000 [ 1726.232377] RDX: 000000000000005b RSI: 00007f301df5e40c RDI: 00007f301df5e400 [ 1726.232972] RBP: 00007f301df5ed77 R08: 00007f301df7f700 R09: 000055733433fe88 [ 1726.233580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301df5e400 [ 1726.234175] R13: 00005573343434c0 R14: 00007f301df5ed00 R15: 00007f301df5edc7 [ 1726.234851] Mem-Info: [ 1726.235078] active_anon:37 inactive_anon:7270 isolated_anon:0 [ 1726.235078] active_file:19 inactive_file:13 isolated_file:0 [ 1726.235078] unevictable:0 dirty:0 writeback:0 [ 1726.235078] slab_reclaimable:7607 slab_unreclaimable:57985 [ 1726.235078] mapped:8706 shmem:87 pagetables:287 bounce:0 [ 1726.235078] free:2250 free_pcp:0 free_cma:0 [ 1726.237632] Node 0 active_anon:148kB inactive_anon:29080kB active_file:76kB inactive_file:52kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34824kB dirty:0kB writeback:0kB shmem:348kB writeback_tmp:0kB kernel_stack:2816kB all_unreclaimable? no [ 1726.239544] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1726.241723] lowmem_reserve[]: 0 1616 1616 1616 [ 1726.242130] Node 0 DMA32 free:2516kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:148kB inactive_anon:29332kB active_file:128kB inactive_file:112kB unevictable:0kB writepending:0kB present:2080640kB managed:1660468kB mlocked:0kB pagetables:1148kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1726.244464] lowmem_reserve[]: 0 0 0 0 [ 1726.244807] Node 0 DMA: 1*4kB (U) 0*8kB 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6484kB [ 1726.245988] Node 0 DMA32: 363*4kB (UME) 77*8kB (UME) 44*16kB (UME) 12*32kB (U) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3156kB [ 1726.247185] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1726.247895] 126 total pagecache pages [ 1726.248230] 0 pages in swap cache [ 1726.248520] Swap cache stats: add 0, delete 0, find 0/0 [ 1726.248959] Free swap = 0kB [ 1726.249249] Total swap = 0kB [ 1726.249503] 524158 pages RAM [ 1726.249755] 0 pages HighMem/MovableOnly [ 1726.250083] 105064 pages reserved [ 1726.250390] Unreclaimable slab info: [ 1726.250698] Name Used Total [ 1726.251153] pid_3 7KB 7KB [ 1726.251615] pid_2 49KB 63KB [ 1726.252061] ip6-frags 7KB 7KB [ 1726.252524] fib6_nodes 28KB 28KB [ 1726.252968] ip6_dst_cache 48KB 48KB [ 1726.253449] RAWv6 220KB 220KB [ 1726.253893] UDPLITEv6 62KB 62KB [ 1726.254356] UDPv6 62KB 62KB [ 1726.254800] TCPv6 62KB 62KB [ 1726.255265] scsi_sense_cache 4KB 4KB [ 1726.255709] sd_ext_cdb 3KB 3KB [ 1726.256152] virtio_scsi_cmd 16KB 16KB [ 1726.256619] sgpool-128 59KB 59KB [ 1726.257063] sgpool-64 63KB 63KB [ 1726.257539] sgpool-32 252KB 252KB [ 1726.257982] sgpool-16 82KB 82KB [ 1726.258444] sgpool-8 56KB 56KB [ 1726.258888] io_kiocb 56KB 71KB [ 1726.259349] mqueue_inode_cache 62KB 62KB [ 1726.259799] nfs_commit_data 15KB 15KB [ 1726.260261] nfs_write_data 47KB 47KB [ 1726.260705] jbd2_inode 7KB 7KB [ 1726.261155] ext4_system_zone 7KB 7KB [ 1726.261621] ext4_io_end_vec 7KB 7KB [ 1726.262064] ext4_bio_post_read_ctx 15KB 15KB [ 1726.262593] kioctx 15KB 15KB [ 1726.263117] aio_kiocb 3KB 3KB [ 1726.263584] bio-2 4KB 4KB [ 1726.264026] fasync_cache 3KB 3KB [ 1726.264486] pid_namespace 7KB 7KB [ 1726.264928] rpc_buffers 31KB 31KB [ 1726.265411] rpc_tasks 3KB 3KB [ 1726.265855] UNIX 224KB 320KB [ 1726.266318] tcp_bind_bucket 8KB 8KB [ 1726.266763] ip_fib_trie 8KB 8KB [ 1726.267224] ip_fib_alias 15KB 15KB [ 1726.267665] ip_dst_cache 8KB 8KB [ 1726.268108] RAW 93KB 93KB [ 1726.268569] UDP 253KB 315KB [ 1726.269012] request_sock_TCP 15KB 15KB [ 1726.269490] TCP 60KB 60KB [ 1726.269933] hugetlbfs_inode_cache 30KB 30KB [ 1726.270422] bio-1 11KB 11KB [ 1726.270865] eventpoll_pwq 23KB 23KB [ 1726.271326] eventpoll_epi 43KB 43KB [ 1726.271769] inotify_inode_mark 93KB 93KB [ 1726.272238] request_queue 60KB 60KB [ 1726.272681] blkdev_ioc 15KB 15KB [ 1726.273129] bio-0 272KB 272KB [ 1726.273600] biovec-max 488KB 684KB [ 1726.274043] biovec-64 346KB 346KB [ 1726.274506] biovec-16 52KB 52KB [ 1726.274948] user_namespace 31KB 31KB [ 1726.275409] uid_cache 8KB 8KB [ 1726.275852] dmaengine-unmap-2 4KB 4KB [ 1726.276313] audit_buffer 7KB 7KB [ 1726.276757] skbuff_fclone_cache 90KB 90KB [ 1726.277247] skbuff_head_cache 686KB 686KB [ 1726.277690] file_lock_cache 51KB 51KB [ 1726.278130] file_lock_ctx 7KB 7KB [ 1726.278591] fsnotify_mark_connector 28KB 28KB [ 1726.279075] net_namespace 115KB 115KB [ 1726.279536] task_delay_info 123KB 123KB [ 1726.279978] taskstats 54KB 54KB [ 1726.280439] proc_dir_entry 506KB 506KB [ 1726.280882] pde_opener 27KB 27KB [ 1726.281361] seq_file 60KB 60KB [ 1726.281803] sigqueue 74KB 74KB [ 1726.282263] shmem_inode_cache 1256KB 1289KB [ 1726.282706] kernfs_iattrs_cache 223KB 223KB [ 1726.283161] kernfs_node_cache 5457KB 5457KB [ 1726.283622] mnt_cache 220KB 220KB [ 1726.284064] filp 940KB 1436KB [ 1726.284526] names_cache 4666KB 5461KB [ 1726.284968] hashtab_node 274KB 274KB [ 1726.285447] ebitmap_node 1149KB 1149KB [ 1726.285890] avtab_node 4976KB 4976KB [ 1726.286352] avc_node 31KB 31KB [ 1726.286798] lsm_inode_cache 2652KB 3051KB [ 1726.287260] lsm_file_cache 64KB 160KB [ 1726.287702] key_jar 39KB 39KB [ 1726.288144] uts_namespace 15KB 15KB [ 1726.288605] nsproxy 7KB 7KB [ 1726.289048] vm_area_struct 882KB 1100KB [ 1726.289524] fs_cache 64KB 64KB [ 1726.289972] files_cache 109KB 175KB [ 1726.290434] signal_cache 331KB 432KB [ 1726.290876] sighand_cache 360KB 360KB [ 1726.291338] task_struct 1010KB 1365KB [ 1726.291780] cred_jar 102KB 164KB [ 1726.292241] anon_vma_chain 263KB 263KB [ 1726.292684] anon_vma 154KB 211KB [ 1726.293137] pid 73KB 82KB [ 1726.293604] Acpi-Operand 120KB 154KB [ 1726.294047] Acpi-ParseExt 27KB 27KB [ 1726.294508] Acpi-Parse 146KB 162KB [ 1726.294950] Acpi-State 129KB 145KB [ 1726.295411] Acpi-Namespace 24KB 24KB [ 1726.295854] shared_policy_node 8KB 8KB [ 1726.296326] numa_policy 7KB 7KB [ 1726.296769] trace_event_file 176KB 176KB [ 1726.297249] ftrace_event_field 280KB 280KB [ 1726.297698] pool_workqueue 40KB 40KB [ 1726.298139] task_group 16KB 16KB [ 1726.298601] mm_struct 304KB 378KB [ 1726.299049] vmap_area 169KB 212KB [ 1726.299511] page->ptl 221KB 232KB [ 1726.299953] kmemleak_scan_area 31KB 87KB [ 1726.300496] kmemleak_object 132708KB 152004KB [ 1726.300947] kmalloc-8k 4912KB 5056KB [ 1726.301428] kmalloc-4k 7816KB 7936KB [ 1726.301871] kmalloc-2k 4800KB 4832KB [ 1726.302333] kmalloc-1k 2700KB 3360KB [ 1726.302778] kmalloc-512 3566KB 4752KB [ 1726.303240] kmalloc-256 1368KB 1368KB [ 1726.303682] kmalloc-192 540KB 540KB [ 1726.304124] kmalloc-128 494KB 536KB [ 1726.304586] kmalloc-96 373KB 636KB [ 1726.305029] kmalloc-64 970KB 1220KB [ 1726.305509] kmalloc-32 787KB 940KB [ 1726.305951] kmalloc-16 364KB 364KB [ 1726.306412] kmalloc-8 318KB 318KB [ 1726.306855] kmem_cache_node 47KB 47KB [ 1726.307316] kmem_cache 75KB 75KB [ 1726.307757] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=178,uid=0 [ 1726.309132] Out of memory (oom_kill_allocating_task): Killed process 175 (rsyslogd) total-vm:220876kB, anon-rss:1116kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 1726.341188] Out of memory (oom_kill_allocating_task): Killed process 9292 (systemd-udevd) total-vm:35620kB, anon-rss:10188kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 1726.390154] oom_reaper: reaped process 9260 (syz-executor.3), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1726.801040] Out of memory: Killed process 9301 (systemd-udevd) total-vm:35620kB, anon-rss:10188kB, file-rss:4kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 1726.819348] Out of memory: Killed process 9299 (systemd-udevd) total-vm:35620kB, anon-rss:10188kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 1726.856820] Out of memory: Killed process 199 (dhclient) total-vm:99800kB, anon-rss:1320kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 1726.875817] Out of memory: Killed process 120 (systemd-timesyn) total-vm:88376kB, anon-rss:692kB, file-rss:0kB, shmem-rss:0kB, UID:101 pgtables:76kB oom_score_adj:0 [ 1726.880296] Out of memory: Killed process 170 (cron) total-vm:5576kB, anon-rss:224kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:44kB oom_score_adj:0 [ 1726.907372] Out of memory: Killed process 223 (agetty) total-vm:4336kB, anon-rss:120kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:48kB oom_score_adj:0 [ 1726.913148] Out of memory: Killed process 222 (agetty) total-vm:2812kB, anon-rss:116kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:44kB oom_score_adj:0 [ 1726.929690] Out of memory (oom_kill_allocating_task): Killed process 9267 (syz-executor.3) total-vm:93676kB, anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:140kB oom_score_adj:1000 [ 1727.031991] systemd[1]: ssh.service: A process of this unit has been killed by the OOM killer. [ 1727.033264] systemd[1]: systemd-rfkill.service: A process of this unit has been killed by the OOM killer. [ 1727.036452] sshd (9306) used greatest stack depth: 23472 bytes left [ 1727.041130] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 1727.043143] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 1727.062665] systemd[1]: systemd-journald.service: Consumed 3.878s CPU time. [ 1727.066772] systemd[1]: systemd-timesyncd.service: Main process exited, code=killed, status=9/KILL [ 1727.070373] systemd[1]: systemd-timesyncd.service: Failed with result 'oom-kill'. [ 1727.083884] systemd[1]: systemd-timesyncd.service: Consumed 2.739s CPU time. [ 1727.095216] systemd[1]: cron.service: Main process exited, code=killed, status=9/KILL [ 1727.095918] systemd[1]: cron.service: Failed with result 'oom-kill'. [ 1727.156017] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 1727.157897] systemd[1]: rsyslog.service: Failed with result 'oom-kill'. [ 1727.178482] systemd[1]: rsyslog.service: Consumed 1.002s CPU time. [ 1727.188882] systemd[1]: getty@tty6.service: Failed with result 'oom-kill'. [ 1727.213546] systemd[1]: serial-getty@ttyS0.service: Failed with result 'oom-kill'. [ 1727.230573] systemd[1]: systemd-rfkill.service: Main process exited, code=killed, status=9/KILL [ 1727.233415] systemd[1]: systemd-rfkill.service: Failed with result 'oom-kill'. [ 1727.244397] systemd[1]: Failed to start Load/Save RF Kill Switch Status. [ 1727.248932] systemd[1]: ssh.service: Control process exited, code=killed, status=15/TERM [ 1727.249717] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 1727.259143] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 1727.264859] systemd[1]: system.slice: A process of this unit has been killed by the OOM killer. [ 1727.287307] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 1727.289591] systemd[1]: systemd-timesyncd.service: Scheduled restart job, restart counter is at 1. [ 1727.295863] systemd[1]: systemd-udevd.service: Failed with result 'oom-kill'. [ 1727.306913] systemd[1]: systemd-udevd.service: Consumed 50.268s CPU time. [ 1727.310898] systemd[1]: getty@tty6.service: Scheduled restart job, restart counter is at 1. [ 1727.312080] systemd[1]: cron.service: Scheduled restart job, restart counter is at 1. [ 1727.314805] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 1. [ 1727.315828] systemd[1]: systemd-udevd.service: Scheduled restart job, restart counter is at 1. [ 1727.316743] systemd[1]: Stopped Regular background program processing daemon. [ 1727.346978] systemd[1]: Started Regular background program processing daemon. [ 1727.348390] systemd[1]: Stopped Getty on tty6. [ 1727.369475] systemd[1]: Started Getty on tty6. [ 1727.370581] systemd[1]: Stopped System Logging Service. [ 1727.371332] systemd[1]: rsyslog.service: Consumed 1.002s CPU time. [ 1727.410625] systemd[1]: Starting System Logging Service... [ 1727.436589] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 1727.470925] systemd[1]: Starting Load/Save RF Kill Switch Status... [ 1727.471830] systemd[1]: Stopped Network Time Synchronization. [ 1727.472750] systemd[1]: systemd-timesyncd.service: Consumed 2.739s CPU time. [ 1727.511329] systemd[1]: Starting Network Time Synchronization... [ 1727.512100] systemd[1]: Stopped Rule-based Manager for Device Events and Files. [ 1727.513267] systemd[1]: systemd-udevd.service: Consumed 50.268s CPU time. [ 1727.543482] systemd[1]: Starting Rule-based Manager for Device Events and Files... [ 1727.549669] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 2. [ 1727.550643] systemd[1]: serial-getty@ttyS0.service: Scheduled restart job, restart counter is at 1. [ 1727.554526] systemd[1]: Stopped Serial Getty on ttyS0. [ 1727.588103] systemd[1]: Started Serial Getty on ttyS0. [ 1727.590073] systemd[1]: Stopped OpenBSD Secure Shell server. [ 1727.629463] systemd[1]: Starting OpenBSD Secure Shell server... [ 1727.641915] systemd[1]: Started System Logging Service. [ 1727.691671] systemd[1]: systemd-journal-flush.service: Succeeded. [ 1727.699981] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 1727.707583] systemd[1]: Stopped Journal Service. [ 1727.709025] systemd[1]: systemd-journald.service: Consumed 3.878s CPU time. [ 1727.742504] systemd[1]: Starting Journal Service... [ 1727.788779] systemd[1]: Started Load/Save RF Kill Switch Status. [ 1727.970136] systemd-journald[9344]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 1727.999853] systemd[1]: networking.service: Failed with result 'oom-kill'. [ 1728.023673] systemd[1]: Started OpenBSD Secure Shell server. [ 1728.026279] systemd-journald[9344]: /dev/kmsg buffer overrun, some messages lost. [ 1728.184960] systemd[1]: Started Rule-based Manager for Device Events and Files. [ 1728.272324] systemd[1]: Stopped target Bluetooth. [ 1728.368777] systemd[1]: Started Network Time Synchronization. [ 1728.562049] systemd[1]: Started Journal Service. [ 1728.618744] systemd-journald[9344]: Received client request to flush runtime journal. Debian GNU/Linux 11 syzkaller ttyS0 VM DIAGNOSIS: 02:19:48 Registers: info registers vcpu 0 RAX=1ffff11001a8b872 RBX=ffff88800d45c380 RCX=ffffffff814126e1 RDX=ffff888018593480 RSI=ffffffff8141260a RDI=ffff88800d45c390 RBP=ffffffffa0008000 RSP=ffff88806ce097a8 R8 =0000000000000000 R9 =ffffffff868686e7 R10=0000000000000000 R11=0000000000000001 R12=00007fa25ae3cf33 R13=dffffc0000000000 R14=ffffffff85035bc8 R15=00000000000000e8 RIP=ffffffff81412624 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa25a95a900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa25aebe445 CR3=000000000da44000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=240f25cf71dfef700474f09f2d63345d XMM02=fc0d192514e9b4420178c345d6012481 XMM03=5aeb575356ca75f0011ed9afc9e9a6d3 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=0e0d0c0f0a09080b0605040702010003 XMM08=64707466730073254073250070746673 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=00000000000000e8 RBX=00000000000000e8 RCX=ffffffff81f433e3 RDX=00000000000001f3 RSI=ffffffff81f433f1 RDI=0000000000000007 RBP=00000000000101f3 RSP=ffff888052617098 R8 =0000000000000001 R9 =0000000000006d2c R10=0000000000010000 R11=0000000000000001 R12=ffff88800f550058 R13=ffff88800f550050 R14=ffff88800f550048 R15=ffff88800f550060 RIP=ffffffff81f433f7 RFL=00000093 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2f6da338c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2f6de60e23 CR3=00000000525f4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=25252525252525252525252525252525 XMM01=000000ff000000000000ff0000000000 XMM02=000000ff000000000000ff0000000000 XMM03=696e656420737365636341002f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00005559553a387000005559553a1410 XMM06=0000555955391ca00000000000000002 XMM07=00000000000000000000000000000000 XMM08=52554300444947564544004449555645 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000