EV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:34 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:34 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x81, 0x7, 0x1, 0x2, 0x0, 0x6, 0x808, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8147, 0x2, @perf_config_ext={0x47, 0x7fff}, 0x2001, 0x7, 0x80000001, 0x9, 0x5, 0x6000000, 0x7f, 0x0, 0x7, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xc, r0, 0xb) symlinkat(&(0x7f0000000100)='.\x00', r1, &(0x7f0000000140)='./file0\x00') stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x5, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="ff29fd99c9e100379c11ffedf00c8f39af39097135c6384f48f4b9ed53a71865bfd7ea65df6c3169b65699a02cb92cc45df7e142da3822cc564974bb2c6b0588fd2c9d7fd0bf91df6add829bfd48d2ea60423c7e34c80796ccd98264cbe63aabca7e060ed0b2a9276432efe55637ed339003a8cc808352629d0c3ded8c9773bb17b0a1987f3800b752df9cd7348665c095b0fb601cdd", 0x96, 0x100}], 0x2, &(0x7f0000000340)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'tmpfs\x00'}}]}) 22:25:34 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)=ANY=[@ANYBLOB='\b']) 22:25:34 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 1873.269455] tmpfs: Unknown parameter './file0' 22:25:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, 0x0, 0x20060, &(0x7f0000000140)) 22:25:34 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:34 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:34 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x500000000000000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r0, &(0x7f0000000140)='./file0\x00') openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x782b, &(0x7f0000000000)={0x0, 0xef29, 0x4, 0x3, 0x2d}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000340)=@IORING_OP_STATX={0x15, 0x0, 0x0, r0, &(0x7f0000000240), &(0x7f0000000180)='./file0\x00', 0x10, 0x4000}, 0x192e) unlinkat(0xffffffffffffffff, 0x0, 0x0) 22:25:34 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 1873.504961] tmpfs: Unknown parameter './file0' 22:25:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0xbcb3, 0x8000) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000080)={0x1, 0x30, '\x00', 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r1, &(0x7f0000000140)='./file0\x00') openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) 22:25:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:48 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:48 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000007780)=ANY=[@ANYBLOB="01a662b0d02e6098db05b2742bf9c01a4ff0b1dbe3d900c4d27d1accca6ff4b7a8399a04a1feb7b7753545dfc74fc86c2228f248c93018e5c82a7c0cc3540f0c8bcc5bf7d10000000000000000ff00000000000000383ae30830458f5e2e090000000effb3f9f8b68698dee7c41b1c378b2ba84a04f2c276f3402516330306003c007d30f126acbdcaae1833150ccabc5c9e50ceb36fe8444e14d20d4a854cf153702b2cd95c00aacdbb89275ea428b0e5213559dae2be255cfbb5708c"]) r0 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x2100001, &(0x7f0000000180)=ANY=[]) mount$bind(&(0x7f00000021c0)='./file0/../file0\x00', &(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40), 0x200000, 0x0) symlinkat(&(0x7f0000000100)='.\x00', r0, &(0x7f0000000140)='./file0\x00') r1 = openat2(r0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x8}, 0x18) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x800}}, './file0/../file0\x00'}) r3 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) mount$bind(&(0x7f00000076c0)='./file0\x00', &(0x7f0000007700)='./file0/../file0/file0\x00', &(0x7f0000007740), 0x22800, 0x0) syz_io_uring_submit(r6, r5, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(r6, 0x0, &(0x7f0000004b80)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x3, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0xfffffffe) pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000004bc0)={0x0, @dev, @private}, &(0x7f0000004c00)=0xc) sendmmsg$sock(r2, &(0x7f0000007440)=[{{&(0x7f00000003c0)=@qipcrtr={0x2a, 0x1, 0x7ffe}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000440)="0869bed976e36276448df417a8011c3bd8f4760383daf921dbec0029ef586c07374322c2a05976b5b6c89318453eac74666d5f", 0x33}], 0x1}}, {{&(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, r7, {0x2, 0x4e23, @empty}, 0x2, 0x1, 0x0, 0x4}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000580)="a8050fce", 0x4}, {&(0x7f00000005c0)="6ae05f16045b56ae7ae90399b9031b4897d0cfa79fb4546164d4359e1adb8a72eb61e1e379143edf95d9212a9d98689bafb8439ab99a8d2f136434d41c3f3a866576ebf473f2265601574c75d627", 0x4e}, {&(0x7f0000000640)="95a1710f0e93c72d402b6146fbb30a07a2e1b1c2b8b85c61cbf3c236e04935fa9431f20992050fb96ca94458017c9c47b7a41c883d4d4ec4e85bd8bdf9f539cc", 0x40}, {&(0x7f0000000680)="1ebf32b4eaa18467a5ff82dec4945a84f90684c52f986e81dc113bbfeee0ec5dc4edd3e52ba57117b05b3cfef0b9e4c2e6ff9419ef3c8f7283b7d6fa", 0x3c}, {&(0x7f00000006c0)="69a75d99f569130a9aa04f7a5ae89d3018ee9dfd735a3f594f3164e2c92f733ed4b26fb13eca87063e5733b40f2d9de713221ece0596f3db441d7121324c857ee4f469197e6d47844da7eef523c8bdfe3d8016e24d3ae754bffd1fa4cc63f2270d4349ebd7b1511247e271ba5c8ffbdf84a2816ef46b78f9d548e475ba3eb2b9351bee947cc50cb85a69b11e64c537d8f833bb3b2ebfb4edbbfcfe07ddb95363339ae29acb92156c84e41cb031dc51f6aa3c9a42897ba976c0210cda2bb9ad33113bd8004d4c741b8a63af61cb1bf96a6a0c332708001cc8f5", 0xd9}], 0x5}}, {{&(0x7f0000000840)=@pptp={0x18, 0x2, {0x2, @multicast1}}, 0x80, &(0x7f0000000c80)=[{&(0x7f00000008c0)="4c3678cf7af6d67067286bbb0af7061940ecf6eecd6042c5e4900312ce0a1bae4a0fd8da0350b0f7b0db6503b4428aeefc1694084e004631352975f2ea5dc333485340cfca59639641baa7f4618d275fb40cea7ca345e225bf96843b65961f6ca9a575796be926879652d2949d68747e13182155e3307035581a473819987b7af6572138aa22ec783b96cf979ae80be8c3317619b61dc4be51eb4c739c7187c7c61032e09a9ec8be91719d0e66c9a5725e84fab53595de77ad871c9f03f55208968670f33e9b37dd47d9", 0xca}, {&(0x7f00000009c0)="b33f0a1d4db760ea1febaf45c9ca56edb07d93ff5b9340a1a4a1a703612e02a598eaf2b25326a161bd6b79789ffa54482b7e0ff095c3c8edc7b1c6e8517df5bee6c3dcab956c7263abe8df026d382527b33c5f1bbc893da5727ccb0231dec7fa2ae2d9a83f48a46b148ccfb6e28f50a438a930ed7ff5589ca9843f38baefa58a58df9f4484122fb0b6b62784149fd39ad3a5d8bbf10bdb368708c92454af7378f508a3237f", 0xa5}, {&(0x7f0000000a80)="4552cee430473ba7a70214cd8d720af213495ed355", 0x15}, {&(0x7f0000000ac0)="72e7addfd82051ace9f79fe7edd59a1ea126621c7741a3b79d31e6dc1ff1e36778b6a538e8427e651882bc27aaf00b55ea174c6053a8c27334d25e8e90d5578658b44f283b53d3e665a87a2632b07380b7fb227bd7aa475bcaa38e31b4be36cee785c6777516d1f25adabc9698def40f5ef354a3d0b8ecd9", 0x78}, {&(0x7f0000000b40)="34b4ceba0836e67a0df8727d1b51fa4ca9821c0f0a2a6aa7f95bc748c45a56247a45f6b3ce9e745d6cf5e742ead983b7a3037f2b3b16b44588090b649dd57f9903deeb8f6c6d2d8be8aecadb58a1d81c60cbade2a731232bd6bc548d2586261e50efcfaacba0ede5c5b1e0d93b794dec5928667d7e93a452b2fc5aa3b0c53c03a94a33fb7d3195ff2b6195c10a38457e88494778ff3ba5300020a8ebaa10", 0x9e}, {&(0x7f0000000c00)="8fe137274600db6f06f4e4e99ac2f17d615b567986e45f4aae61ae688b9f190ffa3e8d73ca692a6582a88cf3e36a2a78d6c8eeef02d2aba74a74fdf6d3dde410f6c94b5c8ca0be54f1f060651f88f47a7d275ba755af4cd6a955", 0x5a}], 0x6, &(0x7f0000000d00)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff8}}, @timestamping={{0x14, 0x1, 0x25, 0x74}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0xc0}}, {{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x4, 0x0, 0x3, {0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, '\x00', 0x2e}, 0xffffffff}}}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000e40)="65298b8815f75d070008a14eee86", 0xe}, {&(0x7f0000000e80)="4f1e38ef61a7606c4c92fba0c5b83d95f3e6389ad8342761837e20ba326a8f777d3877eed2d1dedaeab5134f58a16137034dfa627b0acc1fbbcc7be12a6cf164e7452cd5", 0x44}, {&(0x7f0000000f00)="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", 0x1000}, {&(0x7f0000001f00)="98f8597268f5c56c1ca4d44f7b3c47492117070b2eb7b17233652012ae0d007e1947d73a35a1004faf9886d6eee151855b195a66eb88ab6bec19588ed6ca930d1bfc880b717c0b61f4c3a19b774655a78cd407829da2dbbdc6fd30a25faa7bde6444aae756df64b436ee863c6f1e14b2bb8916803785e6d7bc8ba2fffa71", 0x7e}], 0x4, &(0x7f0000001fc0)=[@timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x30}}, {{&(0x7f0000002000)=@pptp={0x18, 0x2, {0x3, @remote}}, 0x80, &(0x7f0000003440)=[{&(0x7f0000002080)="d43b4d0d6b6af9605ee8ee983fbc0ae9a09a741941a395d47e1371b6cc22301a551097423c69d8b855ce6e626ce8041ee8966def5ba11022674cd6f764d22c5cb6f0a5e0217a061695de7ffeb6e3f2938467fd9275fab385245e81581dab833242646e3fe312a92eecfc5f65cece41036463928100c17701b4f234ca177124bd4c7d7fb08fb8e0e98fb23865b3be6c59a5f139b9f9fc303f53b08d", 0x9b}, {&(0x7f0000002140)="5838bd503c502bbd4317e8fa2d8cf864df49106ca696d9107f97be720ba6d95794d3d2dfeb93b51bae73373d033fb4d308765af1174c9176075efc004f3c5b10841641093957ec98b7e4bd945d07ba0823c5d734f09509187eb23929e42ca6", 0x5f}, {&(0x7f00000021c0)}, {&(0x7f0000002200)="3ffde2b883d7a9f3be62e90d9d3f52d57a0af3dc097ed31a1b1dee797d8f6f5ab0721a14a6107d6ad7b0ef50d7ca308171eba283146b9976cc113e9e7d14a863530957ca2f0b1c900bf0431e2dc5b0ab767b0002399b42c4e2fc538555c6ecceb98b83f07722670402e4a12e7597504d2754c53488a4079142dcc3ed43e08cb6c0fdd3cd149e9416ac9085d80d5471152554992a7e1e", 0x96}, {&(0x7f00000022c0)="b7182e7cb0b128ba73c5d0e025d04dba575cb14659035b5612ed11267a58a48f61d1eefec8a865ff0941064503db17e0f55494dc1cf4f6f39ee4d360e56ba2235262e008f47339ef87c71708adac99d6124af2d69b9c2294bdd720624fa9adb69590d2b6d3f33078a07a", 0x6a}, {&(0x7f0000002340)="2eed85c71d14ca1b66e49dc19a8494419ea62361", 0x14}, {&(0x7f0000002380)="7ba3977f6161d241bdb5c2a1588c0c8e304af87130aaa0fb7ecc090cd7aa60d73f845c4d468f65bb743915cd8aae8db6f3379163833a488a7b78d07cc3fddef26813be17e07461602289da039e063c26ef3a06105d21586f8a941dd12515bc84852e9289902d7d8a571369fe2be0e2d5da4e7b11620ef53561748c7a7ebce28ffef951379f5bb0bf5c", 0x89}, {&(0x7f0000002440)="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", 0x1000}], 0x8}}, {{&(0x7f00000034c0)=@vsock, 0x80, &(0x7f00000035c0)=[{&(0x7f0000003540)="a2f5b481c8e66bf8ffea86e08782667aa96fd53f313cf6b1bca0fc9e220a482d4f8af498dd7a5232afea9c5659", 0x2d}, {&(0x7f0000003580)="1d63307167b97bdbc210a69282eb193c8b7ed112ddac787e67", 0x19}], 0x2, &(0x7f0000003600)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0xa6}}, @txtime={{0x18, 0x1, 0x3d, 0xe100}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x7fffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x124}}], 0xd8}}, {{&(0x7f0000003700)=@hci={0x1f, 0x1, 0x1}, 0x80, &(0x7f00000048c0)=[{&(0x7f0000003780)="3e097b5a1f0c21bd3c2d4949208a0ce8ea316e3fbadcf6a5d081168b230ec432c0d193129149c4096ab002d4b6f5bc42e05820556dd21d2cefdab666547f3b9e3e9d926c0cf7e812f5bcbb20462f62218f38235da33b772cb2b9fb17732d3cc1f40093413385c98fc1f23f5086eb34ca45313f5e5169abbadca9be4a8f1a8aba2963b081dbe60e1c81971b74fde1cd87256e42f39c57f5f616dca4c4cece90c5c86ae44203a6b5074a0b5f3960c5f0673cd520", 0xb3}, {&(0x7f0000003840)="7dbb28f68175573e39a1a0f84ccdef69aa41af3bb9d753c9dbf0dd0ac4a3233e9a433fe998350d063f5e611a775009be58b7fc77fed35a169940feb688197d3145d052d74bb979bbeff1d2e8df2767b5f7f5f2009cc0f9465934f514b8f0", 0x5e}, {&(0x7f00000038c0)="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", 0x1000}], 0x3, &(0x7f0000004900)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x200}}, @mark={{0x14, 0x1, 0x24, 0xff}}], 0x48}}, {{&(0x7f0000004980)=@l2={0x1f, 0x80, @none, 0x1000, 0x1}, 0x80, &(0x7f0000004a40)=[{&(0x7f0000004a00)="2acc9f5a6ae781537f812a3b0bfae8d01e", 0x11}], 0x1, &(0x7f0000004a80)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x60}}, {{&(0x7f0000004c40)=@ll={0x11, 0x17, r8, 0x1, 0xff, 0x6, @local}, 0x80, &(0x7f0000006140)=[{&(0x7f0000004cc0)="f44e88a04caac7c9c5e1260d86de12ffa520632d6cb959f6e0dd23c4d54c03b62ae3eab5fe77f341e7e669429e73b59f661cfc6c86991cffea686b05b5a4c9cfae9d8676a6800ca2bbc31cfa4161ef2ba70384a0fd8e0fd1f9ff67bed1a2e29603ebcd9f5f2227dde50094a1064c3fe563c5e22c2da8de85014aaa9d415db12af13fca6e33f3c202df61c3da437bd1d7e6953e163570e22a610f9747aa4990517dc651e97ca3b05525dff4", 0xab}, {&(0x7f0000004d80)="e9a05addecb5786d4e1ff3837995b84f09e7b6fe71d0c2b362a6e5d276476738350ba010f4d548343fb6c7dcf77a5333f85619084ddd22cd35ae2f1e154e402b0acd56e3e2dd1987f76a48d9ea91a8f4aa53712e94e3d7ec41656c86fef0ef22e911e24f94b71db05cff6fa1634d4cd16e77b4702afebddb1250b8de02d1b503463ff115cb251f16f223060aa780d3ae1c0da080647455a119b14f3210d8600564eb4448a6535159707a526b296ea4cb9ef62849cce2ac82b1ceacd1a076ffaa974949f0d73f05d698a0115298c5589aebecc8dfc08f52a3519605", 0xdb}, {&(0x7f0000004e80)="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", 0x1000}, {&(0x7f0000005e80)="44ae43f936a474e29bb27c5f2fe49e7150f2725c260878d8b850d7a39868efb4931565dff7def3377c8b9542f4bf1a3007a73b65804b51fae7da8eec9748cc13a64c4991fcdfa1621b968a3290a7f9a28a7f935e20f83a1111a41ec8f9276d8bf224e6b5d080ac726f158eb1c301e8fed350a09bba578cacc7bfaf374a79d557760bb6d74274478fd73b1db3bf35928ff732f2d2855245cbf26e5b6ac84b69a4f590ed1a56bd43f9adb1034c3c2a225e71031956ae523a4784f7cadd1361a897229185df07da5197ccb80fd5571f26c168416ab2", 0xd4}, {&(0x7f0000005f80)="dd6dd25b9e6dcd7f2c7f4c1b1002a02f838d0d14fe1e47aa8e4189e011bc8f68689192a9fc1d1533e82e53f592fafbf6fff313190eca174056279217b58448d32e696bfc4276805189bb46e9224421fe0519b6f458bc35353681d46d47befa07fba24abbb7995222346a6b", 0x6b}, {&(0x7f0000006000)="af6cda89af2278cc237dc3", 0xb}, {&(0x7f0000006040)="e7792b3427ac5be8e5937285e9480c3cc7d2aa31438283646baabf4d9da859aecd4eef31e6010b7f824a7d4ca4af032787fd2fb7859cba7d7fc6858d7b5ce0ee62fdf4fc74c584585e23aade1d1491406f2af82279003bc4c0a14dbd6b8a6ca77564a60938def7894bd7fe903ed734c9159e6958401823d570898aa4c100e37f74ddd1c6b40cfcc9829179a150fd14242856fb2abf63fc8e97bcd903bc4bc8bbfd7b6be4480c7d025912382d0acf37f8cffc8855d942de98daac269c0ef9056192", 0xc1}], 0x7, &(0x7f00000061c0)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}], 0x78}}, {{0x0, 0x0, &(0x7f0000007400)=[{&(0x7f0000006240)="3190dd552056a927c39849afd8863c582ab9f3ae8d14e86d0d5a7f418095ff06098f2767f7c1717b5df78bed0dd0da29ba17c931e4d5dcba6962d04b83ea945a26fcd49a74e1b30d39a5ab4227ae72964d744265ad544cea68a7d24e2a9e5f2aa615c7939934c7a671ea429f57170a4fb6e8051c4d689da8f0616865", 0x7c}, {&(0x7f00000062c0)="1e04bee80fd9b090712177f61118784e6ca84c4dbffc638f78cf836c2a", 0x1d}, {&(0x7f0000006300)="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", 0xff}, {&(0x7f0000006400)="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", 0x1000}], 0x4}}], 0xa, 0x810) 22:25:48 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:48 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:48 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 6: keyctl$set_reqkey_keyring(0xe, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) uselib(&(0x7f0000000180)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) recvfrom$unix(r1, &(0x7f0000000600)=""/7, 0x7, 0x40002382, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x7, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="a8169dcdacb1e91501f618f4eb31ed7f7fa0e628461814bc2b78c975501a5cd133e622c3df3f992e938ac1f3ca243b1989f53dc82e3ece87d11461f5b3fc9d634919bdb744f819d5be1f91ac1b0359c5a8cbbc18b6a5e27218a2793e3a20bcee89acac5e242c66184a5ac57c137a59a834c3cb124794cad9e0acc267375235e0f869a841494e6f33af364189bca2ec402a36a060ff909c74092cd1cf420a859aa1b35bb132f604279b2fe1063af6c642f7f8c986769343f6e1729d77275a94bd8402428b6a16db71f223ff1af352a235841c80fac95ab3951b0734fc75045500e2b083a83436b6c7", 0xe8, 0x7}, {&(0x7f0000000400)="4213aad90410670c7d94ceadf0640e7a605dc33df2f6780b6861e6b7eabea76636f7d9ce772b7604bc55a617575e4022", 0x30, 0x4}, {&(0x7f0000000440)="deb25489b34eac340297fe47af0ceb0e9097d39ac30e983a2ad12c7d38afbd1fcce6063a5d8fbbd0bd869fb377ffddce2ae13e834b371decf69510b56d58d02058d3ca5484351deb1d0c82cce3cc841c13e83bc313006aac9d501fe9489a1b525d7bdcb87990416a0d36d3efc83309d1e30ad7dbd41c89ad207cfb3692a040cdc0c4efae0deac23325e6150bc6a99eba722db3faa38e4051f2e01505424ed367e6b4220d", 0xa4, 0x1}], 0x800, &(0x7f0000000580)={[{@fat=@sys_immutable}, {@fat=@errors_continue}, {@uni_xlate}]}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x88000, 0xc) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x400000, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x400000, 0x100) 22:25:48 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:25:48 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:25:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:03 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:03 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:03 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:03 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:03 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='hfs\x00', 0x1820800, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000001c0)=ANY=[@ANYBLOB="0090e73b79731a9b618ba2c056194ba3b48d38de4cd6c7910bd8881649106a7df81e923db87cbdfca485b698d50e1db949c6178ccb88fc9fb9669d3d8124b1c7e42bd8577836690b6b7636f6deb471e5dd844b93cad44f79bd51f3"]) 22:26:03 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x9000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000240)={[{@size={'size', 0x3d, [0x38, 0x78, 0x78, 0x67]}}, {@huge_advise}, {@gid={'gid', 0x3d, 0xee00}}, {@huge_never}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x3a, 0x34, 0x2f, 0x34, 0x30]}}}}, {@huge_within_size}, {@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x0, 0x31, 0x0]}}]}) 22:26:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)=ANY=[@ANYBLOB=' ']) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101100, 0xa) 22:26:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:18 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:18 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:18 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x2042, 0x112) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r1, 0x0) chdir(&(0x7f00000013c0)='.\x00') setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000200)='./file0\x00', 0x4, 0x9, &(0x7f0000001740)=[{&(0x7f0000000240)="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", 0x1000, 0x2}, {&(0x7f0000001240)="9a5ef690a4577d836ed5917f2ec0b3087c4dd3ecf0c8a10f71ba86fa71e7d879265f86a4e7458cccb565101d671d21066177c7838e134aae0bd3f3935ae432f5a49efcf59e2978f590fbd32483bdda34a0fe13979ad140cc171ae73df97cb85ceecae40042d558d9169332e7034313605487525468f1b9203e0e73b784b59c25d7c204ace87cdb70cad48709eef9b64d5ce97bf7ccfed7a8420d6c53f2f1b429b42389e3fb39a47f264f4cc7b592eac8a4d8eaf211b63aa2ed37af4d4b4b809e", 0xc0, 0x9}, {&(0x7f0000001300)="fd3ce613f6d7c1cbd5f339832122c30fe8b5b3800d52df9502552c58d42bf624a205cf95f253e9e77133e35445122bc538f22ceec6687e999df746224483cf315ae772be2800a7a193d0624ee84c145c9f2165806c03009666cd009e6728bcd0d43990d4794e1f29783d760f55fd2c632ccb5ea28972ef245850074f126b5ecbaa35751f2e890bf57ccbc8397c3896347f638b5d18cb0c65504408d3582adb3b7aabeb63dabb24b5bf", 0xa9, 0x4}, {&(0x7f0000001840)="8c07c123e855ad80af9879e334bad5e9da153f51293a5e5b64f93144251e5a34b0f98eaa6715ca47138032963e0180e4b6522317ecfa79e951052fe98eb00cc7834b1113ce0cab386bb783a6897f3b2e5669e2", 0x53, 0x3ff}, {&(0x7f0000001400)="05748290e469061bd709003179610ef54662bee8950beaf50220e58d34c18ed2ba7d82201b5b5b7e06668e7be1ea3525359578ffe4b5cd581b12d854c9b9fbb7de42fd7795596f80a51dbb3815f444dcc2b7fe1ef4cf66a6540f44735d62e432b786d6c0bed31275f6d134c855849bdbf6d3439c156ae6834107c93767fda7a5cde4c0ead8087f4e", 0x88, 0xe5e5}, {&(0x7f00000014c0)="22fd6c072a1e05bfbb8d8e1375dc04fe6eb4b7455321c3658bb64a41fb4c90", 0x1f, 0x3}, {&(0x7f0000001500)="7bb21a0d7f64dec0ded8e8d6aa5a1f2a103fb75bad2fe6d522c81cf26acb8fdac258ded3b619a255f40b8cd87e15e29d18f5c321ccebad3432e5d5c1949ddb1e7451f5b146acbef117df8b0576b3e2b774e990e119c1775cf907dd75165faabad4fe9e5bf2579ff0198742a6703f8bf415b8805e748ea6eca2ba7b9cd3b84a48eb66d0503ac34cb9687c7b42f81521e06e67414582da39c552f9812c317f4743aacaa4b5f1640eb149c0ed18aa1cc290d00711", 0xb3, 0x7fff}, {&(0x7f00000015c0)="73fdc69880b42f01fa04c12a439af92e00328b5b2bf9dbeda29f95dd7d320c3558a61dfe2e269bcaf8f690f60250f7e3c941fb64a126e27f9d77c9285c11504e4ab99a7f79989081dbed46cbe2834600c1d9fbcb08c1c545d3b8560aaea54167704752654d55c2868d081759944ac8c494fd9cf228aaa5f230553a08d5610e8c6ee4e3e33c7f1d80f1a0243e08ac34f4eb0cdb522eca4f221472781c94a1517a2acf04e9078654eeacc4f7ec7b2791e86a92", 0xb2, 0x1}, {&(0x7f0000001680)="71ba2a4e31524e0bc08493c86ee35b9aee3991507d769f5192a6f7575720b159c6ca0ddd50d129c339c288e13b3754b20ae0ae48e3ddea324d565043db4306c3e6aa716f3256f803a01fe3765d3bd30006c5a5c243f5240ef1042c26fc961a37203a56a2427faefb594d9e347fc295e9597ed7daf4c865a5d94c3aba663b8f0ed4b847f42044c64a70960aa9148344", 0x8f, 0x77a}], 0x310081, &(0x7f0000001900)={[{@mode={'mode', 0x3d, 0x5}}, {@huge_never}, {@huge_never}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@dont_hash}, {@euid_eq={'euid', 0x3d, r1}}, {@audit}, {@obj_type={'obj_type', 0x3d, 'tracefs\x00'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f00000000c0)='./file0\x00', 0x100000000000000, 0xfffffffffffffda0, 0x0, 0x20020, &(0x7f0000000140)) 22:26:19 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:26:34 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xb000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:34 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:34 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:34 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = signalfd4(r0, &(0x7f0000000180)={[0x80000000]}, 0x8, 0x80000) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0xff}}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:26:34 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:34 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:34 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r0, &(0x7f0000000140)='./file0\x00') openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r1, &(0x7f0000000140)='./file0\x00') r2 = openat2(r1, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x8}, 0x18) unlinkat(r2, 0x0, 0x0) 22:26:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:35 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:35 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x5, 0x40, 0x6, 0x0, 0x1f, 0x3001, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x5, 0x9}, 0x40000, 0x308, 0x1, 0x2, 0x8, 0x5, 0x5, 0x0, 0x7, 0x0, 0xf89}, 0x0, 0x6, r0, 0x0) symlinkat(&(0x7f0000000100)='.\x00', r1, &(0x7f0000000140)='./file0\x00') openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) open_tree(r1, &(0x7f0000000000)='./file0\x00', 0x80001) 22:26:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)=0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r2, 0x0) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$nfs4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1000, 0x4, &(0x7f0000000440)=[{&(0x7f0000000200)="29948703aecd4113cb49773e9ddd4210ca613a58616520177b41a26e753e8f0305fd77b95dbb1a47a3d33563ee2cf1df47dddf4f17b387e8862cef39f2172840db234d13e31b9bec7f48a009df18ad650281590b15c56c9e6c4c3f", 0x5b, 0x7}, {&(0x7f0000000280)="552b72c5d30fb47a510d9495d2daccbe9fec17b73d798dcea16aa6e2a8395637684c8d77ad1c7376b4792a64ebd446af90679a344e4a8f0d45582048b97340d9dec52105fa5a06bb2f10933d3b7864259f9936340cbbf218a9dc7aede8b8737a3e0c", 0x62, 0x4}, {&(0x7f0000000300)="f2a66ff656186f1d1888cde20547a5256260d91913a867104a879bc2bb4ab7c588ca9056804c0d8c651d7d0ee9b6c8dfbac4da798c01a58be56712a6e6d2e229db273aca817606f55d47a6634d4e5ac8b8bde88c4ba80d63fde9116ead7fc8057fea66926a43dac124c0d5460f314ee0d2929c627d8e681e69a822276136781b259b8d5e4cadb05372ffc63b5209dee736d55875b568565548e1ec82d16f05e76eddc9ccdca3a5e62760506ebab9e3927c6813d3efa9bd719e63a2eed73cd8f9342185f44bee7e4fe6f0fc91926e96bd43d79018564e9904dd2febe35b26d7cefd6f502e5ee1d2", 0xe7, 0x7fff}, {&(0x7f0000000400), 0x0, 0x9}], 0x1010, &(0x7f0000000800)={[{'[)/(*.@'}, {'-+#'}, {'tmpfs\x00'}, {'tracefs\x00'}], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@dont_measure}, {@fowner_lt={'fowner<', r0}}, {@dont_measure}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x39, 0x37, 0x32, 0x66, 0x63, 0x30], 0x2d, [0x31, 0x31, 0x37, 0x33], 0x2d, [0x33, 0x34, 0x63, 0x66], 0x2d, [0x32, 0x30, 0x62, 0x38], 0x2d, [0x33, 0x63, 0x65, 0x62, 0x64, 0x62, 0x39, 0x66]}}}, {@pcr={'pcr', 0x3d, 0xe}}, {@euid_eq={'euid', 0x3d, r2}}, {@uid_lt={'uid<', r1}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r3, &(0x7f0000000140)='./file0\x00') setxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@random={'btrfs.', 'tracefs\x00'}, &(0x7f0000000540)='\x00', 0x1, 0x1) openat2(r3, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x8}, 0x18) mkdirat(r3, &(0x7f0000000400)='./file0\x00', 0x4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000740)={[{@uid={'uid', 0x3d, r0}}, {@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0xefc18d38cb81c5dc]}}}}, {@mode={'mode', 0x3d, 0xfffffffffffffffd}}]}) 22:26:35 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:35 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 1934.045178] tmpfs: Unknown parameter 'nfs4' 22:26:35 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:55 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000240)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r1, @ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="b2ae9d2fe96b6454f0d6286021e3c310763636e35002b8e43384072ef68fdfadde73bdf136bdf80bc7284f05dfb7c535598f2c71a9e23694e51bbb4cf1a9b90a1cfab8"]) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x100028, 0x0) 22:26:56 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x18000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:56 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:56 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[], [{@pcr={'pcr', 0x3d, 0x6}}, {@subj_user={'subj_user', 0x3d, '-}\xb3'}}]}) 22:26:56 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:26:56 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x2, 0x40, 0x9}, 0x18) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000200)=ANY=[@ANYBLOB="08522eca854d03a535283961771534e08479ab8519e06d94633f6a8d56accae1613308259c78bab57bd2263ec5b7"]) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1}, 0x14}}, 0x0) statx(r0, &(0x7f0000000240)='./file0\x00', 0x100, 0x2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000003800)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000037c0)={&(0x7f0000000380)={0x3440, 0x26, 0x8, 0x70bd28, 0x25dfdbfc, {0x5}, [@nested={0x117f, 0x1e, 0x0, 0x1, [@generic="c8571069aaaba2a6456e319cdc8e69d4cfed", @typed={0x5c, 0x62, 0x0, 0x0, @binary="246765db087770a6ee011c7df6ed37326560e23a5c64b1f06ae3f02cef81039b4f2e4bac94f6b211e30c0895db9d4863591b0dded253666a736a803a62752a485d7c2b3bebca2f3fae6f089b5b1112bd13db4a40d0bc60a2"}, @generic="53c8c0a13442fe2600eb9a11be05b8d317011df24414a551b6cc523154565fd8f8cd5744de22e92ea0b8880a3cd5ae533053b21bd1cb69684088b1f00b0609b1", @generic="c2102b4f76dfb15d4b21ef250b0926379b96da55e7066ed71171ac89cba0ab4bc1f3ebc8e0c49a02ed9c3c69671b8cb6d0c07fb624e4b6dc339f537567ad86732e50246c10cfc66d73e55a11a6f157088f31f2a732dedc63461ecf3f8c77f4db6bd2d6ee0247972e0e9ea88e72623f640bfa70feee0c710ea5013549bb76d6a9aeb86b73ac71e9c4c17dade0", @typed={0x8, 0x84, 0x0, 0x0, @pid}, @generic="0c9e774e6d6f1c83bffbb761eb2ad1fae2cd9220152987473dc2ed0077f096b8917ecc236a", @generic="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", @typed={0x14, 0xb, 0x0, 0x0, @ipv6=@mcast1}]}, @typed={0x8, 0xa, 0x0, 0x0, @uid=r3}, @nested={0x2291, 0x62, 0x0, 0x1, [@generic="8be0049cb03246f2aa46299b863962bcb979122a17e82b195d199db5a1aa3b9b7a1686e7ee30ae790b304dab32a1bb7bfbc595982ea8e2c03ba99556c820f7b6c43c3b37e73c2cb8766660b99b6328091c35ac9d0b735dc7c8880997dd118ece36f2f5eba1302ae4422946c581cd2b83ad6ad5ba992f9c13b34aa8af5a62a5533dcb0700317f7fa5f489b57846ab6c87ff16e74e23c7fce3fb7244efbe63c761c90228977cc6dd0c888389f47dcc6cc38d75eaa0215db5b202e0cd6a7966e1f897d9f3b10f6422b1b46f193889c588d6c65e0d80bf1b1a9cf003e06e8b5ce62f02e1673a267f7d159e596aa8d828521a16ff314bc86671350f2dd805c4c7b7f9e8f34309030a73a5ed4c34c230883462f52347ef50e6459aacf695adec64a4fe628dec196c0cead2468e1e8569e502454c60af53ea6468303aa1c7d0f5247e802b1f2e9bdc9393384cefdd82bbb839148da01060866872a65846cb7868f6817a8f6dfaf9f3cb0b967596f00f548798b64a5f9e3b8e05a3661166ca44608e6e0b750c90370ae8e66e77efb6f5adfff6d2cd74a12c05a016d40198282a8f3bc0b3d5cea366bd82a0fd548b6348ad2dc30703a0116203ca797961a53cf00341bcd2f7cf5315a87418272dbbab6d51d4bea59efe77fd5910c13a71e334a5c8c5b519ba008515a4928debe2ae036da9543a26e18f06481737207373fc536108f49f9b75b5443b875421407a2ce1204dfc6a2985396c9fd0b938abe8fd4659a66a76d1867cbc238dd082a65a72982b22efdbcc8fefc67e2a9cb1b7b639faf97908cbbe6799de853e7ed9c23fcba382f03dccd08680f6551121074270169a65ddf1a8c5f5923dc093cc5a1dec81e152b2cab23bf3a19712e11ee468b0134c91ba8f2312cdd1478c6c3d7eaf965e11fde61b096ad10aa4bfe0eda821170c467f16a5b5ba0e08ab886932588c3a6152c48eb844dde8816caed91b4a69865e23415a3bfbf9f9f88bb2932dafbca3a76bbdbe2fc4693ccc89ed444487cc72d56b06cff627fb70a6ffa97cd9b5b6c3265b7b51344cb430a14ea8dda176895e269dc1d070b603290a27820ff443a8f6fdf0d02e74b72d10605665993d06242147975b862ef4020278ea7b03f36bed1a0135cf1e2e403c3094fc7c3fa86d72aa3ae12488091edeadf62aecfda8b1501020e2d222cc22e1be99e4a7ecb0b3e8ef17d1674aa837b4c3ca8af95f84c6f58ea5d9cbee12549de93c828ea7d8670613822eceb657c815c9e0ba041fccf02af7ce98b576bdd570737c2432f1d56db8505d2f0721659c348900a581527425f511f58f013850b9435b1f6832f0dbd8b1d306dabbba1032d44ae37b5f79e4b2c0ff766e77c8f2f24659983419b73794c0226eeccb4c2c3b3a75cd0494d52ab2febb29cb1805c6c9f46f12d3054a92adb64eec51ebb612e82183d3070c2b7d9fca14c26e4aee9377baa33a6d2b4d896ea44e33edf411ea47affc6375fedab26534e0cdb5e82f45d493017a76438cc52ddcd04fa7fe94d447fa3cb6a9a00ecc934f20ada78a79c230006db43f41241e1c254c6382eac6c267989703d56cfb0ef12d15d1381e64b4d1bded30695ab3972faef2d4fe7f3564e4da1aa560105e297fc179acad51be922357058f5ee5a0d083a764f1c812bd427c3c09520263b0cb97ac84f3e02044ee3523b58055b6a25ab6960cac5b6df2e016afd699e0fcff4bf8c532b4588c856c4c2675e2f65d7d5e4d62d34b082806ec04bf17a025a05735e62a1f346cd2e755960d441a8de4827e4cca0b01a8e2bdbb81d8fd1b9b3c37a21fe818a1b0dfa3fbf0d0a3f081e12776e625293703c886ea8d71b32eed0159fc45124cb9f1ab24d653837b8650b943627ed70a4bd385df574044390023f21c417bf1022ccbf933e189779b8b5f86428556f275be6f77fa2fc6590b94364e3667c712223d34b05f7eef78f8ee696ea902321275ac2cbe4d58b6d336d7ab6d4d1e854aaf28a31dad75a0156e16229fb8cb9b2afb5ad1365adc70d14e307c5c8d522094c746c3eadee0243bd6eef9ef1364b387c4555b2ac87ca3f9ed3f79b43b694f453be5774a80467effeb582887d566520c4761830fe44e8215062fe6152a6e8945316c007fe6db5c783b3cd31775c4ee37884e3b8d37848a200dea9bdf59a7735dc09b03e03276fedcf7664e8b181053f2eef25c6af0d6cf3bb41e4ffbc6da36e59c97afccbb7830e709e748a539edbd688039853dd85f10c9517f1a26e3f6603a00d563d84ba94bb0560d056d85caf7cadd5417810b1b030d4ba3978a04e1506bb4e4085d0b72ea699479bf84d7a40c15460f32469aa62decdc6dec44200e3713e02a945c0421ebb74dac1b37327bfa5599572638f2f570ddcb17b7316c4c1bbcd8a2e44af88adddd858d71a07ba9776df74a318aac4679bb3fab5af5fd0491c859fc74bfdf99399129569a2c4c6a17421a3a64adaf652099a54c6986b05427ccb9f5b241a107a687a5651487e6ad15ed36f97ebec2631866cb3ea083e20d70722b686e807c6ca740a062a13d39103e7f091b09f5c14925d576d7624dd711d586a7477fe2d73cfc441daa7ccd5a133d0931a5c0b5b8c03848872f889fdb2017dc9dec0b6c936f6c55e3de649ca42fc06c3ca9b72094cc8149ccf2493d10a4b2106b8d33ba7cfceca6fdcd84bf00ea0779a2b7ad8f4899e39d98827a18811db658cf37bb561dee2aa8722d2730a69ee6415eb3b074b3456625b8719f3879ad6cfd8164505a197b6c0c682a9efab6c23e907a471adf7abee4e972bcdba70842bc99aa2cfa90089cbe72a9a91904f83017077586bbc218956d6f69d5c4e84ad1b5c76abe5711234f7a8fb0c7eb21524c7f23268b2b0d1e11d8f4b722c2a2d90641dd34fae45c9fe69eef54c42db3e7969534c8879336fc1f6694801a17dca789557a6481658a3c4048112e9e5f37b32a1d1de72b5663315952037404c0a63ce3586e753225a691153873855a46fe63ca579f2bd87a43f01d8f7a3f7ebebe44178d81083f8aea9793a979af1a7e614d6496a102c8f824904c37a0c54dc84a9937d0a310518368077880ed84e027b3053e863791547494b52db77c288c530a2607d9e616c18cfb1dfff5bd32bddf240271784a5199e65b751c89b8af00b5a2db062df27483a52652642879623240b34c145802a9dc73943635889adf96ed3a122f43f73209e2bfe4044dbb1c840df66345274f1e91f64906932d45a767f8576d6d0857c60bd52498fcef5d8229c23d4c51733927658591a318a2dd9aafba2ab8795eee313d4772d036b08feb1b476347becb6fb4c82e14ef5dd9ee5d97250f8cdbf6d7129a6cf86ad7e1f768888ba65351d18f68f4f0e709aa7b03b125de290bd43c83089959f7b0985e30dce1bcf7ce8296969c11354b34bd681f511167557223ea3ee881abcf608d90544b411b235ed6400249d0073c283fc1081d0d8003d31d1a23249dc1070322839a5a8d29f73ae773158fcee220c89f48c1af7cfaefc9b581e4d78553635761c3868534c0b58de27fd0aa2112edbf3502c0fbdd4ac2d1036d283a6532908260defbc707c793d8f870a2abe27e96044b29052cbbbd86a4cf42a9b36eeb10c573a096704562af1aabfe839ee0eb50e37ce6611a5ed1ca8009ea1e6622f58d2e618a4c86b4b3b25bd080d474ecff5f083da61964af039135fc86352d0bda516469ec89b649b8785c0bff1d623ea78b0943cc98192b2b65ac952f05894d518fcda89ad0c8dfd8c6bfa109050b9cd05516162dde4bf4be638124fcfa17029b718c7cce96beb0481b809040d2693fe4dc28b39005580be75806b745b6346e77995260b34663630be4cd2bbc46fc9ee0b225939dc319194b6e0ec7687b5519b979b37218f8dc2ddd48545f5683accfa9e4af8f0288d44e7f59ed5d8690222e891a65402387a123915000573afe7daff9e8be3adc07881a11ee9ab2df876337de9b96fa085bc30bdfc0f81c1994429aca602d4e2b509625e73db5479e720644073db50bf648945b111ddfd80b94fbd9b62cc3b6fb6ae274eec6e29fc7b2dd57ace36355f8c29e72a666d75c4ca5c72455e0e592af93f1afa026e56462c52938623f88f9a14ec2dc6877b620cf576b0fdff4a87086347f820a913f1e8f3a42520ea18cc7a519fa925806224c94b1c346178acf666b2c2de3c0d4f77768536cd5374fb409aaf98ee4b13baad846adaa24558144cd64656b418c16b90aafc5df5596904a84c479a4d61019f0a45e058d8a65ed361c926a094383506b3f9e3f05579f0a7140e34dc9f071de302d5fcf602a6bb15a274840942126656e1b7b5e9c3eb6fc0b41d43794b1114cd50ec86f564658a73adfbcb8d7befba8757900f11995fd22c2f0d5b08457db741f351849941931c673b7ccf226de1de2204c0146f92d6a398da2b1c371a907c7be534173955cedb12e8d5b247e5bf84a361905ff14b2341a54852820d8535ebbd1e3e801a6148945bc6e5abbad93a7e980a13f3579619c0d5532bc0de933356561c0f2042741b217de32e10ac8fd248d03a982c2bd9d987cf4bbf02176e65c1ce0f694cb911461409280a2c424b9495ed0d9ddd0fbfbb42329de9e2d4544084cb8c20fba61b0abada777630f6e623a913eed9f760728fcf26a05b2501a525f04e1ac11077ee934c7bd02453c59b148789576e4943dd8c3bd120e6daca49f06f4902a6178fd7df1dc90a804ee50df1f1f143e8a1d8810bf0b1953d798e6b5074f08ccfdadc1c37aadb1c579a9ff04b1c8d2a5c53a781d339707963e6d15b72f1e3a5b4a7ef5f216287469a939dd8397a2799edba5aa73f783ab37e81f305e1bf0664fad489ade13616980d5bf45c09114037056ef45ad523e51b2b7ef16beb186c28c353a0f308d60c3519d9e81d7f917052972d05bd325156dd7f57f7c6f63fbea4f4f49e6127e7d0ea44fe1d0170c428142bbbd04f354e93933cf64a08d31007ea03049dfdaef5c93af131eaf4fd5476a47fd510d705237744c905da1c6685dded29f62bd1fb3cb58d632e034db26567b4aff7eddb538e8d168fbd3200aecf250db248eb89259088b7773d8ee31b6bffe40f041ce930e3b615422a9c461f910c4724417a8eefef628abbde0dc6906728ea60b020460ceeced9513429a70e2e1f632752664e3cf8dbe50d7d38f3c1c9d39b6b9e7bdacef226948a13debefd06db1410d31eb021a326268efc0de2b06916a6641c7dd9701d5523e315a162035b1491bbaea087774c5f51da4ddcd34a1d2d2c3d22e68796a1a0275140f48899fb86b469c072c498454a3c8fc73db75b99914f04f63fb1a2dd20337c428352fd2de26694462d28d39105894ef7cf84876b2a1bdd6aaaa7ce7458f4fbdfc51e5b536075c4c2593bf87306a5657595ac5536b0760945cff559ba88748f8a8c790f7074d0f1691923ef6cb69732c208d6a68bdcc2eab1f8a6db682e72aa4b81df67d6e820efa51f27940b5b3c463900bfff337fe63e94c40a5e069fcdafbd8323b6de81fa0ae89ec39288cee33d16cf4e2e97858dac6b2fe28a1e29c2bfc7b729630adc89b2eb764ae8980ca6e37f21d0b0fe4ac3b5f9542ab0e33863a01d676e57b0f5e6713038b5844b39bcbe8305fc7e907560f5632083c0e7b5c348bba94fd52dc2e1d41c8217ea1de84abaff192e02b195646eb477b24cd308b8ce82cd1f7661fe9c238e9420f7c9753d9f709e8c643d54f7c588a0f24cb8ac30f83053baace383ed7f8e5da38dcab962dee3e", @generic="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", @generic="a1fc1106605f4452de21aa3c37c773036800fc8259f17c0d78bd04d3b1498257d52f0ab9a5959d50d7e210fe60f892b2f8e28e6b9fa7bef780c5edb6d11624700ca534a62207e1bf5a99eff79a39bd29454402a5f3c649751c0c599e7ccaaae063319efac4fb079cf88137d782c1ab60dff849b0b1c936f08a6d210995", @generic="a168ff9bf4ecfbdb1856fec821e02a98d73de80ace768b289dae387e23fb474f1b37403c93ac64a99e11db1c4d19ae6677a964f356518ce532661a1b02658aba01ba007f35e4b7ba66f7c7af7ab1285f6326c19e69adfd916b7a5e1806a7ef47fa17baf9ba8258c9dd6a9a52c3abd3e8e738992e156ec6f7809abeb493d61325ce9d473c6f9d0ffe46f63323814f8cb9abbe3eda28de0122d78ad19cce18f28c5aaeec43fd7dbead9904a531a4a8b0a2419867f3fcb41134a3b0d91ae7273c6801753b197ac37349ba9049f3f17be45dafe49d19815ae38c5587872ecbe5367789c070aa9dad9c3d7d7be22d673a8be99bb9db186942cfb1e8cfac0097569424aae8c5633597f266efc446efb754c7c7fb9edf8b956eb7450e139f52d1141e114e579df0cc1328412ae2d03dd598571859b9fce6a7881d9de9cdcd0bd0a6ac979996c8ef337b7386da1c6d0c92e33ac30e7e247fc48d15e41376fcb25ca406574d1c03bee9dc97e76659915a6b1ec3c39eea6bc27dfa258fa8218478924103dd9f50a2b2926eb2f8402ea84155d57ff35e9bd302534767dcca7afe4e1a33e9184b93c33d4e397f0c49fd736c7d3166cfe8bd26c38d92d4ee4615516c8a7c3181286c227e744099e00a27e4e744049fca590bdc9c1afdad34f1237d9b2dcff98659c1eafd78c5adc2ae00c3bff53fe99e788642c99c1aba14fa824e9377ea916118a57381ae0793a694f9ce0cf92a098d063953640bf48f732cdc7a1705dbc5d36d30440292762d11defe0a3a8b8e3e645551fd91b71588444d83814c088078bb4af7b3c1e2ae24161e20a450cd7c078b8fe34779b9696bfef3fc2502687281db2b0e19186cc0682e3b113e1d92863cde953526d235750435969fd8b555b26ddefade26fe6fe2a4c3a1833ed19140a77b860344f8041e54e55e5a49aaa6df9081ae5f1a08e60a01cdd49229780042924d3f0c312deb4ccbeb87a8157a136d7861e7a2b7e046e65cb158e06715185e6519b9c29a37ed3a37197ac8dc77bd58296e67a1474c392afcf32a2546feeaba88a444989b13dc7ae7844d7f9c92d7e8cc434d64ca3f475ac753189fb4f33c278cd3f980996f35c03b36566d13b53335920a024152ce287e3d4a0376d06c93ea3974b80a49c55c76038399662cd520c206c725c6fc9a3e535306c02fb1e98694691474260f1d04b1600ce5ca213ca761a0b27455467d11acd05ac23aebdd562f397d790b99af8723057741da641032b1988b363326f3e55db62f1866ddad4dadcbc697f7c4ce878d7f8d906e8f0f783ed741124ff3777377a42e01cc67dc8de1a39effd3dede96fcef1543d044861d079adf6942cb1b0a8234324518028198d730164b526435da6b7604d3dd58f9561b3b04695c742da5a0337848230a314d3d4b88093ba49a94a107c76e28746132d4d2d33708d5ea4d5c873182c0eb1ac43db8b401732857d21b490d69690c3e706ea9b4401bfe0dafcea0465e3b5557bad2ffec16dfde6dccd5b22e6d8111fe3b8c709236a308c28b0a39b1845d25211509617e4e679098b5f9674d880fc329d318f581bae7a7be249757f405b4d71a67b0eea7ebc8ba5271a01ffc373c51f1b91b03a6adbe0d2b25b435e4754b14f09f7016eedc33c4dd096da203b399b2e62dc56815bd4ab9a77daba39eae35be5c8b80c9672459c8ade1df75982a27ced04e0ebdceac19eb4a9fff2a2a2782eed70d59e53015901400900eb8cad11dce583405b52bf57251d3177f2f178811afea39fe97c208ae55794bfa8591d392cdb111ddbffae723438aa5966fdb5998a174a3c42111e06935c03618480ed9973bff873d9e9f56b9536f3e2ecda2eed07e249cd5876376da52eb47e7e81b0f3ab313b0e440668d5e2c1897c8c9dd53b47ffbb8c330b52bd1b6e53c738f863020f0fc0ae14daee318a7d7f37d4d80ed3c02ff515febee025357dc7e60ceae6219690b50fabbf1e93d96e2d0afea237208a9e4dbf290bcb1f7846aa22938ce4aa12134b2a5383bb5d8ce03315c7363336482397a97dadc3bcd68bd58deb88969d07266bd2c323ebd6bd7d959b13a38d2160425ff878c37da45c8736ea5766b058b922088a5e51c633b83f95e463ed031afcb1b05ffcb4d22ba41d861960cc086172128281140a911fc25c8f0f028865e3a6e5b92b47cbfcdc602da8795abb2ac9d1ebe7b3ea48b53ab8540436a4b8d27dc19d3d7b753eaf1bbee2edbb533a08046c9d540d8daf1bfeb08f88b7a5f303e196c0051fb6c4aa231f9c0b99f903706c715b1d08a9768be00bc0342c3a411471c3ab43ac2954f210b707af23c8bb6e9f97b736dfa142b09006006ab1fa62ce9b77023dd4fe6d1d0c7aa62b883dd58a48406e4714c85c65fbab90f75dbdabc2b6fc3363e142486a3457183fc98aafc72f68e5651701894c4e38b8c55afd3be3d40ead916acd31d0677bd487a79ae71752407be41032e39f6e871ee28a389ebb6197b31909e94c14f27198d67004af16ae395f8e16d158998db61bf830434bbf54573ada9f2796403d9a906a8668953ae2d0abc6a4f8328d8b911a1dab1c0d3359a742c18616eba1b68ac154efc351dabf5344dd98ce3495d438f05ad0accbbb22f3003d3d79ae29f146453f2110c32c20cca7dde10f6546de5bc9e56287ae9cfa73cb976f29b78d2f4c1f21c8ad27ea8831cc1f1d861ec08757bafa8bfdf7986681d1848f55d8a065ceca8ee943ab5679ccb20071eb6742ffcdf422b8160310c2480bea7a202b098159ff68304620bdd1c6bcd178bc2079e4a1c64014918973975f6dfb53d5e1be71bbf09ec235d35d7a74b3bd3d19dbc5b9c598ef7649d21791e09e3b0d1bfe0307a5314176072d38dd84e2ed7c9da499a1e2a4aeadb647e56ed1c108fbb4a51560099b99d3c8e9e8b67ab31d9db3036d0dab303b8e29f5c6ab3520a44f6875e6ea12c7f47501dc55fc8bbfdd2fd7dd1f69f620a5c8dcd66cc76103a4ca5da05039e1cf09cbaca53d2d35859141481abdec4dd55441b986b6d30685c325ad0c31a6fc0433402db2787ee66b7f71b7def235734055d6718f95bc257f37945c353a8f6a35664dc605fc04f3e5ef022e61c760e5478234dc479ced39d1c1c746858a628bd99e1bbb966f922d650483f0ac0b15419e1ba2715aa2818d0a590addae4130fc50fa18cff0291b4e864d9c969681b48226b28935047ed48ca298bbaa36e8406fe1111d5bd42a67f027a3036981f9aea8ac8f0f21d9e42500e8c42fb4f7d8e0ba227e394d7d675e4436e80a84f0f34e18dee6970faccde7641c1ddadf937ad8e232d7d675414807271930e722f7d46e08f5422d03cd3dfdbfa4c9c66bfcdf90f2cc90ba77e384a626ff1a7612e72e1645d9ff5d176c0994681014c8e78848588cb85bbcd6f469877edd2acb683a87c2b119af5f4d511c1fb1a7f1866d59858d06d83029285c4ee900f30805c8e209737fc51603197128ff15212358a058531db6247893080878598517c2d13c8d63e63c714c25ca4890e35db4d42e4b7ddb47347356c8ca6be2d45dac27ef299e2598fbe6dcf8006866bafcc315937546fc508f010ff6348b7e3b968d248412fd26b644929937207ca66263eaa1c32e6303439e00dcc52fefabaae1e25180503eec8ab70a370fc2b114c6bc3f9abdfc3372bf3eb7a11c7a6d1732ab115937b6a55d3071c1b921a88cd338a562265cd5360f799f4a7b495a3c9ab2d09d11576b059eb245a16a56f25d4256772feacf2b384737b1dfbdc836f022744775adc7cc4495f388c84685b2ad9f9eb8231c93414f24aa9ab58eb12b934d97df8ec7d9638cc37badac910cff9513affca5bd55a6291bfb327980c2b8469e6e74a6726b636e44a0e30a662219bedb8edf584d6fdd6e345ffa7fb169e832b7775edd368bfd4db35e879a49d8586028084385307424642d9fde522492fe0c6d6aa0dbd544054cb7e1a80135ec4dc168b81d58546b09ad5fb28fe2be54cd801ec3d7786e927f298844d1b9b35e1fc26128a54aed3f3e917fd8dbb113070ffbdc534cf9dc31548df7f4d5f130d610e94193d543dcf36e9ee5bd2192df04f5d2e4d36048658fdeced4a8261e49ad133e619baba4ccd65f43f658e4b3eaa7c469ab869d5f2a7fc01e7660069876cd64f4e7869065408d6b472d7826509ebbc6fab4c6b7f90a4f9b15ad3dafdcd2927e6980fd3ca95533c6331dc6484e6708e0743b4aaf072bd04cd44f61d531c6982eb1daf67e896f69f3bbb6c1694ec74d2673465a6c0a23a5aa6530f579a9cf0ecaf452792f406393e582daba26b7b37224974928fb4b9b09663dd79d54e4653e1426fb829bc424759c585a6e1610a43de4c62afdcfd02980f86d938c23dc08789d6e737c78ab96ba004a60bcb838828dca02a6bec4cd3a06dd643a7bcfb8b9237f66b6c926629d418850de76f5e5e765519f24d82109c7efe095452a4fcac9ff819c3558be020b83f2d21272b8f2d3798cced9437e0d352d153bdead531bb3ad68d92057b6381d26b332cdb517a7b4e13a7c2792a7e9acf722b8779f39df724748aa235a28de45df759a9f4c882b263ccf192c619a5df0b03964f55367b295596622daa26a99d64708840bf14182fa0d984126227c2c513bae89af4f89afd479eac611fe7d789d64e4df0fcbab085afa92189c3207f729c720a8fe7856c7b4b307484735ceb8a1313282290a16e5b71d84a29560290e2f97e3d0f94d688c42bdfcc044fa561d4006ff3ccd8dfbe535f0bb54d5c249af279407c3a8f8470210daede20aea4405415e6afaf408cde45bb72fdcc157950ba6928e303276883bd22536ca4732308574c19d4047d50cfe1f978f90500cc12ca48aad7b26f42c6c50f34bfde77e8e5b3c63be9514ba6e7622c399353c6d51926961a4ab37a3a6588dd5da7c100cd674dd0b960875a93218e4781a3d7d83928e6e14ae4a32b55ad1c8496b20a4c816673440042fcdda17426a69c301b978019509a6558ef40299b8405ef28fd7c687bcb9cc72cbf1c5a0285b9b749f8cd9e777c8388a921cbfa88d9ac9542315d8db5d3ae00a4e6f46c6cdd0a5373292e64cea98ee0571e3fe4bed8dd5cf5fa903f9986823439aa2529c3fc96931331aa10489b2ea6c30324727cae400f50dce0512ad431d16d27dcfa00a744572370af635df1eb78c328858fd23226fde1b5f5d1bc97142eae89e48972c79b6fb51c817026a067d3f30cc7ba11576bcf6030cd8b867e6b4d51e27ef3cbefa1af5e2bcbc4bb86209d7f900d4731799923a400e62cffed3e1b283222d999dcdef64ff5441069e64cda0db32b5640c1866045f863b95ae1250f6c0bcebb83e4b5508347422c55b84598bd2dd20f5caffc342e3697fa01ebbcce923340bba4ea97adb2a128fa024b3dc84fa6b2b95127fa435a7f9a5a83d573dc319de94daceba69e27094a026cc1d6454ffa1d6f95c1736d811e4fd702331a1721163257135eb1626f58215305ad416ace2ea3c0260b9b42f43318829a1eea7c97c0bdd5f82b58619813fd60c3c7473b6154ad49764cd8b9db97cd9bed7104139a54caf3ea430a712638b886b4b516513e42606d4d9ea7677305c2e24426105a9fccec850e7162201dbd55687effbee787e067ee14d89e7fcf0dd00c19d16cd04cbf1dec8deceb97f0ba7936e76815221f4f9ba696bb2f4a9bc2194c68b60020df8b03fa38393a806646c47684a38bfcc1db4e95809319752ffb3028e01cf32ee909d3b97189e99088f50cb021980607810c", @generic="82473f6fb26e9048d3049e4fa939d44799a99d1b33b9c341641f587f5df3966a308159a8748bb176b1c119412d9b92953c5ea488189e69289c987206613fcddc194ed9", @generic="9d1ea2756e29eb88a646e0c2e53bc1d28ffe1da7939d62ba46aea5c19b93f6a0b23372c7eb2255c11926809f4ce20afb9c447c525b31da3888cbc8a0006cb778520d37ea4ffc646c2469e431ba981e150a7e73cdd35ec43f68344e80b3fdfe0e803cafd12b0f64db68965930c1f07f702efd044930f9d24fef1fb4eacc4de68c35cefb97c3ab04d90e6d322be5671c333fedcf89f32da6451552a3099ab133d14af4eff0dddf40ce1984214277a1fbc0ecae01b973bff75005320bac8e906f22", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @typed={0x8, 0x67, 0x0, 0x0, @u32=0x789f}]}, @typed={0x8, 0x4, 0x0, 0x0, @u32=0x1f}, @typed={0x8, 0x6d, 0x0, 0x0, @pid}]}, 0x3440}, 0x1, 0x0, 0x0, 0x20008000}, 0x10080) 22:26:56 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) 22:26:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:26:56 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 1955.282454] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1955.316481] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 22:27:11 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) 22:27:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:11 executing program 6: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x4, 0x8, 0x8, 0x1f, 0x2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @loopback, 0x80, 0x20, 0x4, 0x1}}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:27:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:27:11 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) 22:27:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x220000, &(0x7f0000000200)={[{@subsystem='net_cls'}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@name={'name', 0x3d, 'tmpfs\x00'}}, {@cpuset_v2_mode}, {}], [{@smackfstransmute={'smackfstransmute', 0x3d, '(-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']'}}]}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:27:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:27:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) 22:27:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:27:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) r2 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r5, r4, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) syz_io_uring_submit(r0, r4, &(0x7f00000001c0)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x5, &(0x7f0000000180)=[r6], 0x1, 0x0, 0x1}, 0x9) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:27:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001200)={0x4, 0x80, 0xae, 0x9, 0x6, 0xbc, 0x0, 0x2, 0x40214, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000011c0), 0x3}, 0x48010, 0x5, 0x100, 0x8, 0x20, 0x7, 0x57ae, 0x0, 0x10001, 0x0, 0xfff}, 0x0, 0xc, r0, 0xa) r1 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x10000, 0x2, &(0x7f0000000080)=[{&(0x7f0000000240)="474bd2fd0f2c13e0bddd0df16d31b4a2e343cae5855ef65614a82f4b8f16c278145c9eb01bc085d8d3f815b0e5946cd6a1719790e96b5d29fa15fe176a0a13e4951907312db6d45e2baf8812385d617695f7c77aec80dbba6321865c3ddd4edea5bfc189fdeb08987156d5b27eb187f78385a0f26ea401781002ac81a1186ae6bc3a746f86e51da5302109f53816b8e2da6310b88cc1cb1c4276e9ec9e4dc801b7a91da0a30958", 0xa7, 0xfffffffffffffff9}, {&(0x7f0000000300)="b9c4005c768430e2f15f6df366526850045e21b27d91266aa4608dbfc4b187ef739c5cc1349ddc8419d587cdb7ceacb9a2e511d6d2795eea160107073b949dbe6c0293453d8333e69ffdbb7ce24e4c2780b484883f6165cbf23d041911bfe003fd9020f896fba776c7b176ddbd06937ae393939ce95a7a1d7533dff214e3de4340143255e2134dbbcf288257c062f7537e5d501a", 0x94, 0x400}], 0x1000001, &(0x7f00000003c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@hash}, {@smackfsfloor}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_measure}, {@dont_measure}, {@appraise_type}, {@permit_directio}]}) symlinkat(&(0x7f0000000100)='.\x00', r1, &(0x7f0000000140)='./file0\x00') r2 = openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r2, &(0x7f0000001080)=[{{&(0x7f0000000480), 0x6e, &(0x7f0000000780)=[{&(0x7f0000000500)=""/103, 0x67}, {&(0x7f0000000580)=""/141, 0x8d}, {&(0x7f0000000180)=""/2, 0x2}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/40, 0x28}], 0x5, &(0x7f0000000800)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000000840)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/230, 0xe6}], 0x1, &(0x7f0000000a00)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000a80), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000b00)=""/147, 0x93}, {&(0x7f0000000bc0)=""/125, 0x7d}, {&(0x7f0000000c40)=""/117, 0x75}, {&(0x7f0000000cc0)=""/248, 0xf8}, {&(0x7f0000000dc0)=""/182, 0xb6}, {&(0x7f0000000e80)=""/93, 0x5d}, {&(0x7f0000000f00)=""/195, 0xc3}], 0x7}}], 0x3, 0x10121, &(0x7f0000001140)={0x77359400}) inotify_add_watch(r3, &(0x7f0000001180)='./file1\x00', 0x800) unlinkat(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x1, 0x0, 0x4}) 22:27:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:27:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) 22:27:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0xa000, 0x1b8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:27:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x2, 0x0, 0x0, 0x1, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:27:27 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) 22:27:27 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001200)={0x4, 0x80, 0xae, 0x9, 0x6, 0xbc, 0x0, 0x2, 0x40214, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000011c0), 0x3}, 0x48010, 0x5, 0x100, 0x8, 0x20, 0x7, 0x57ae, 0x0, 0x10001, 0x0, 0xfff}, 0x0, 0xc, r0, 0xa) r1 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x10000, 0x2, &(0x7f0000000080)=[{&(0x7f0000000240)="474bd2fd0f2c13e0bddd0df16d31b4a2e343cae5855ef65614a82f4b8f16c278145c9eb01bc085d8d3f815b0e5946cd6a1719790e96b5d29fa15fe176a0a13e4951907312db6d45e2baf8812385d617695f7c77aec80dbba6321865c3ddd4edea5bfc189fdeb08987156d5b27eb187f78385a0f26ea401781002ac81a1186ae6bc3a746f86e51da5302109f53816b8e2da6310b88cc1cb1c4276e9ec9e4dc801b7a91da0a30958", 0xa7, 0xfffffffffffffff9}, {&(0x7f0000000300)="b9c4005c768430e2f15f6df366526850045e21b27d91266aa4608dbfc4b187ef739c5cc1349ddc8419d587cdb7ceacb9a2e511d6d2795eea160107073b949dbe6c0293453d8333e69ffdbb7ce24e4c2780b484883f6165cbf23d041911bfe003fd9020f896fba776c7b176ddbd06937ae393939ce95a7a1d7533dff214e3de4340143255e2134dbbcf288257c062f7537e5d501a", 0x94, 0x400}], 0x1000001, &(0x7f00000003c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@hash}, {@smackfsfloor}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_measure}, {@dont_measure}, {@appraise_type}, {@permit_directio}]}) symlinkat(&(0x7f0000000100)='.\x00', r1, &(0x7f0000000140)='./file0\x00') r2 = openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r2, &(0x7f0000001080)=[{{&(0x7f0000000480), 0x6e, &(0x7f0000000780)=[{&(0x7f0000000500)=""/103, 0x67}, {&(0x7f0000000580)=""/141, 0x8d}, {&(0x7f0000000180)=""/2, 0x2}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/40, 0x28}], 0x5, &(0x7f0000000800)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000000840)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/230, 0xe6}], 0x1, &(0x7f0000000a00)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000a80), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000b00)=""/147, 0x93}, {&(0x7f0000000bc0)=""/125, 0x7d}, {&(0x7f0000000c40)=""/117, 0x75}, {&(0x7f0000000cc0)=""/248, 0xf8}, {&(0x7f0000000dc0)=""/182, 0xb6}, {&(0x7f0000000e80)=""/93, 0x5d}, {&(0x7f0000000f00)=""/195, 0xc3}], 0x7}}], 0x3, 0x10121, &(0x7f0000001140)={0x77359400}) inotify_add_watch(r3, &(0x7f0000001180)='./file1\x00', 0x800) unlinkat(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x1, 0x0, 0x4}) 22:27:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) link(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) syz_io_uring_setup(0x795, &(0x7f00000005c0)={0x0, 0x7f87, 0x8, 0x3, 0x32c}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000000640), &(0x7f0000000680)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f00000006c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x57f0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r2, 0x0) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0) setresuid(0xffffffffffffffff, r3, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="be6ccb512286027908b785f9446e923015730bee2d9c1ce5961f53fdca9779d32ca136f1b54d288847979ab6b496b9e4b4c0cdcd75ab729fdd1db20893170b44b9987c522615a122317dbb521122837c63c2e04a035ebef5ef14534d9fca913540172a48781aee40ec3f9e2c003965badde6fa1f370868d26670e418e5e0ca8833defd005acb5a9c36820767e9013671f4a88080005a1f5e", 0x98, 0x7}, {&(0x7f00000002c0)="1b133794f7bbcd50a871ad047e110a3becf5e00408270ec2ff0d48563e5510093387e0f52edea3d9d9ea109c66a29077f690d0fe6290caa294f7a2f99d51842ff224ed5be3d838b3c50630ee69e551d6f04641b31aa839339eb1a783e71404405bc79b2ff91c7b9f01", 0x69, 0x8}], 0x80, &(0x7f0000000440)={[{@uni_xlate}, {@shortname_win95}, {@iocharset={'iocharset', 0x3d, 'ascii'}}, {@nonumtail}, {@numtail}, {@uni_xlateno}], [{@euid_eq={'euid', 0x3d, r1}}, {@hash}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, 'tracefs\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'tmpfs\x00'}}, {@uid_gt={'uid>', r2}}, {@uid_lt={'uid<', r3}}, {@measure}]}) 22:27:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:43 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='hostfs\x00', 0x0, &(0x7f0000000240)='tmpfs\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1280008, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0]) 22:27:43 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001200)={0x4, 0x80, 0xae, 0x9, 0x6, 0xbc, 0x0, 0x2, 0x40214, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000011c0), 0x3}, 0x48010, 0x5, 0x100, 0x8, 0x20, 0x7, 0x57ae, 0x0, 0x10001, 0x0, 0xfff}, 0x0, 0xc, r0, 0xa) r1 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x10000, 0x2, &(0x7f0000000080)=[{&(0x7f0000000240)="474bd2fd0f2c13e0bddd0df16d31b4a2e343cae5855ef65614a82f4b8f16c278145c9eb01bc085d8d3f815b0e5946cd6a1719790e96b5d29fa15fe176a0a13e4951907312db6d45e2baf8812385d617695f7c77aec80dbba6321865c3ddd4edea5bfc189fdeb08987156d5b27eb187f78385a0f26ea401781002ac81a1186ae6bc3a746f86e51da5302109f53816b8e2da6310b88cc1cb1c4276e9ec9e4dc801b7a91da0a30958", 0xa7, 0xfffffffffffffff9}, {&(0x7f0000000300)="b9c4005c768430e2f15f6df366526850045e21b27d91266aa4608dbfc4b187ef739c5cc1349ddc8419d587cdb7ceacb9a2e511d6d2795eea160107073b949dbe6c0293453d8333e69ffdbb7ce24e4c2780b484883f6165cbf23d041911bfe003fd9020f896fba776c7b176ddbd06937ae393939ce95a7a1d7533dff214e3de4340143255e2134dbbcf288257c062f7537e5d501a", 0x94, 0x400}], 0x1000001, &(0x7f00000003c0)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@hash}, {@smackfsfloor}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_measure}, {@dont_measure}, {@appraise_type}, {@permit_directio}]}) symlinkat(&(0x7f0000000100)='.\x00', r1, &(0x7f0000000140)='./file0\x00') r2 = openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r2, &(0x7f0000001080)=[{{&(0x7f0000000480), 0x6e, &(0x7f0000000780)=[{&(0x7f0000000500)=""/103, 0x67}, {&(0x7f0000000580)=""/141, 0x8d}, {&(0x7f0000000180)=""/2, 0x2}, {&(0x7f0000000640)=""/227, 0xe3}, {&(0x7f0000000740)=""/40, 0x28}], 0x5, &(0x7f0000000800)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000000840)=@abs, 0x6e, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/230, 0xe6}], 0x1, &(0x7f0000000a00)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000a80), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000b00)=""/147, 0x93}, {&(0x7f0000000bc0)=""/125, 0x7d}, {&(0x7f0000000c40)=""/117, 0x75}, {&(0x7f0000000cc0)=""/248, 0xf8}, {&(0x7f0000000dc0)=""/182, 0xb6}, {&(0x7f0000000e80)=""/93, 0x5d}, {&(0x7f0000000f00)=""/195, 0xc3}], 0x7}}], 0x3, 0x10121, &(0x7f0000001140)={0x77359400}) inotify_add_watch(r3, &(0x7f0000001180)='./file1\x00', 0x800) unlinkat(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x1, 0x0, 0x4}) 22:27:43 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:27:43 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:43 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:43 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) 22:27:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:43 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:27:43 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) 22:27:43 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:43 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:43 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:27:56 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:56 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:56 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:56 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:27:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1010, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x2) 22:27:56 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) 22:27:56 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0)}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:27:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) mount(&(0x7f0000000180)=@md0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, &(0x7f0000000240)='tracefs\x00') rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)=ANY=[@ANYBLOB="10"]) r0 = syz_io_uring_setup(0x8000a8d, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x80000000}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) mkdir(&(0x7f0000000380)='./file0\x00', 0x122) syz_io_uring_submit(r3, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x80010, 0xffffffffffffffff, 0x10000000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r6, 0x1}, 0x14}}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000280)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x4, 0x0, r5, 0x0, 0x0, 0x0, 0xaecf1839cd75a438, 0x0, {0x1}}, 0xda1a) 22:27:56 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2015.700984] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2015.744895] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 22:28:09 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:09 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 22:28:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x1020028, &(0x7f0000000180)=ANY=[@ANYBLOB="957fc5e3b6bdc3209d1c151adeb3869025b402c064cbe881d7ae0776"]) 22:28:09 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:09 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:09 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 22:28:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:10 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:10 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:10 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 22:28:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x0, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) setresuid(0xffffffffffffffff, r0, 0x0) r1 = getegid() statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r2, r3, 0x100) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000002c0)={[{@huge_never}, {@huge_within_size}, {@huge_within_size}, {@uid={'uid', 0x3d, r0}}, {@huge_advise}, {@gid={'gid', 0x3d, r1}}, {@gid={'gid', 0x3d, r3}}]}) 22:28:10 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:25 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:25 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 1) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:25 executing program 6: r0 = gettid() capget(&(0x7f0000000680)={0x19980330, r0}, &(0x7f00000006c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8001, 0x0, 0x0, 0x1004, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:28:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:25 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:25 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:25 executing program 0: timer_settime(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa558}, 0x93b2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x40, 0x0) sendmmsg$inet6(r4, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)="a9", 0x1}], 0x1}}], 0x1, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000000)=0x100) timer_create(0x7, 0x0, &(0x7f0000000200)) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f000003cf40)={{0x0, 0x800, 0x4, 0x5, 0x8bb, 0x8, 0x4, 0x5, 0x1ff, 0x100, 0x81, 0x1, 0x5, 0x0, 0xa79}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f000003df40)={0x80000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {r6, r9}], 0xf, "34e8da55a9488e"}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r10, 0x0, 0x0) r11 = accept4$bt_l2cap(r3, 0x0, &(0x7f0000000100), 0x400) copy_file_range(r0, &(0x7f0000000040)=0x8000, r11, &(0x7f0000000180)=0x7, 0xd26a, 0x0) 22:28:25 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @broadcast}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6(0xa, 0x3, 0x10000) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000180)=[r1, r3, r4, r1, r1], 0x5) faccessat2(r1, &(0x7f0000000240)='./file0\x00', 0x40, 0x1000) 22:28:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2043.994059] FAULT_INJECTION: forcing a failure. [ 2043.994059] name failslab, interval 1, probability 0, space 0, times 0 [ 2043.996668] CPU: 0 PID: 10516 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2043.998149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2043.999883] Call Trace: [ 2044.000442] dump_stack+0x107/0x167 [ 2044.001224] should_fail.cold+0x5/0xa [ 2044.002044] ? getname_flags.part.0+0x50/0x4f0 [ 2044.003022] should_failslab+0x5/0x20 [ 2044.003827] kmem_cache_alloc+0x5b/0x310 [ 2044.004686] getname_flags.part.0+0x50/0x4f0 [ 2044.005626] getname_flags+0x9a/0xe0 [ 2044.006413] do_mkdirat+0x8f/0x2b0 [ 2044.007164] ? user_path_create+0xf0/0xf0 [ 2044.008040] do_syscall_64+0x33/0x40 [ 2044.008823] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2044.009905] RIP: 0033:0x7f1388369c27 [ 2044.010684] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2044.014562] RSP: 002b:00007f13858dffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2044.016159] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1388369c27 [ 2044.017662] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2044.019168] RBP: 00007f13858e0040 R08: 0000000000000000 R09: 0000000000020020 [ 2044.020664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2044.022180] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:28:25 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:25 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:39 executing program 0: r0 = fork() ptrace(0x10, r0) ptrace(0x11, r0) ptrace$setopts(0x4200, r0, 0x80000001, 0x0) pidfd_open(r0, 0x0) 22:28:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) mount(&(0x7f0000000240)=@sr0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='nilfs2\x00', 0xa, &(0x7f0000000300)='^!{+[!+%%.\x19\x00') stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) bind(0xffffffffffffffff, &(0x7f0000000340)=@l2={0x1f, 0x60, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x7f}, 0x80) 22:28:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 2) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2058.001967] FAULT_INJECTION: forcing a failure. [ 2058.001967] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.006966] CPU: 1 PID: 10555 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2058.008639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2058.010650] Call Trace: [ 2058.011298] dump_stack+0x107/0x167 [ 2058.012186] should_fail.cold+0x5/0xa [ 2058.013117] ? create_object.isra.0+0x3a/0xa20 [ 2058.014242] should_failslab+0x5/0x20 [ 2058.015171] kmem_cache_alloc+0x5b/0x310 [ 2058.016161] ? ksys_write+0x21a/0x260 [ 2058.017092] create_object.isra.0+0x3a/0xa20 [ 2058.018172] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2058.019413] kmem_cache_alloc+0x159/0x310 [ 2058.020438] getname_flags.part.0+0x50/0x4f0 [ 2058.021584] getname_flags+0x9a/0xe0 [ 2058.022545] do_mkdirat+0x8f/0x2b0 [ 2058.023464] ? user_path_create+0xf0/0xf0 [ 2058.024545] do_syscall_64+0x33/0x40 [ 2058.025523] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2058.026794] RIP: 0033:0x7f1388369c27 [ 2058.027707] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2058.032208] RSP: 002b:00007f13858dffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2058.034072] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1388369c27 [ 2058.035805] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2058.037554] RBP: 00007f13858e0040 R08: 0000000000000000 R09: 0000000000020020 [ 2058.039285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2058.041018] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:28:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x0, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:39 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000400)}, 0x0, 0x7c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0xfffffffc}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r3, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x2007, @fd, 0x0, 0x0, 0x0, 0x0, 0x1, {0x1}}, 0x80000001) syz_io_uring_submit(r3, r2, &(0x7f00000003c0)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffff9c, &(0x7f0000000500), &(0x7f00000000c0)='./file0\x00', 0x80, 0x4000, 0x1}, 0x40) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400, 0x188) r5 = gettid() rt_sigqueueinfo(r5, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x100}) perf_event_open(&(0x7f0000000340)={0xe403fb99db79ca42, 0x80, 0x5, 0x5, 0x7f, 0x3f, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_config_ext={0x0, 0x7}, 0x14004, 0x4, 0x6, 0x3, 0xffffffff7fffffff, 0x800, 0x3, 0x0, 0x1f, 0x0, 0x2}, r5, 0xb, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508", 0x5}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000160, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, 0x0, &(0x7f0000000280)) recvmsg(0xffffffffffffffff, &(0x7f0000004780)={&(0x7f0000003280)=@can, 0x80, 0x0, 0x0, &(0x7f0000004700)=""/96, 0x60}, 0x0) syz_io_uring_submit(r6, r2, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x200, &(0x7f00000048c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x80000001) openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 22:28:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:39 executing program 6: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)=ANY=[@ANYBLOB="7bbb554b", @ANYRES16=r0, @ANYBLOB="010000ddffffffffffff1300000008000300", @ANYRES32=r3], 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x70, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="f4426ac28cb7527fae6aeaa0a1ba900834db7cf87ecff6b3996001f48b0493c2d20a22fef1816736c50c910f29b77a96109d7056043500960382accfedb60dfdaa55de9b7b67e3996b87e4efd737f34141491f15d10c5d1e0348eb0540e4221c77ae3ff7593885de84f9c7d7", 0x6c, 0xffff}], 0x10000, &(0x7f00000002c0)={[{@huge_always}, {@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x30]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x6d, 0x5a, 0x30]}}], [{@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@appraise}]}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:28:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x9, 0x0, 0x0, 0x20020, &(0x7f0000000200)={[], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x30, 0x31, 0x66, 0x37, 0x30, 0x57, 0x33], 0x2d, [0x65, 0x64, 0x39, 0x34], 0x2d, [0x36, 0x65, 0x65, 0x36], 0x2d, [0x66, 0x31, 0x61, 0x66], 0x2d, [0x33, 0x35, 0x62, 0x64, 0x64, 0x61, 0x0, 0x30]}}}, {@uid_lt={'uid<', r0}}]}) 22:28:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 3) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2058.434858] FAULT_INJECTION: forcing a failure. [ 2058.434858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2058.438366] CPU: 1 PID: 10594 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2058.440190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2058.441954] Call Trace: [ 2058.442659] dump_stack+0x107/0x167 [ 2058.443626] should_fail.cold+0x5/0xa [ 2058.444631] strncpy_from_user+0x34/0x470 [ 2058.445745] getname_flags.part.0+0x95/0x4f0 [ 2058.446907] getname_flags+0x9a/0xe0 [ 2058.447895] do_mkdirat+0x8f/0x2b0 [ 2058.448836] ? user_path_create+0xf0/0xf0 [ 2058.449755] do_syscall_64+0x33/0x40 [ 2058.450739] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2058.452095] RIP: 0033:0x7f1388369c27 [ 2058.452935] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2058.457823] RSP: 002b:00007f13858dffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2058.459849] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1388369c27 [ 2058.461737] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2058.463630] RBP: 00007f13858e0040 R08: 0000000000000000 R09: 0000000000020020 [ 2058.465534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2058.467424] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:28:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 4) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:53 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) unlink(&(0x7f0000000180)='./file0\x00') setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000200)={[{@size={'size', 0x3d, [0x0]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x2d]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x65, 0x6d]}}, {@huge_within_size}, {@uid={'uid', 0x3d, r0}}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@mode={'mode', 0x3d, 0x2}}, {@huge_always}]}) 22:28:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:54 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2072.942358] FAULT_INJECTION: forcing a failure. [ 2072.942358] name failslab, interval 1, probability 0, space 0, times 0 [ 2072.945029] CPU: 1 PID: 10625 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2072.946491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2072.948235] Call Trace: [ 2072.948794] dump_stack+0x107/0x167 [ 2072.949564] should_fail.cold+0x5/0xa [ 2072.950385] should_failslab+0x5/0x20 [ 2072.951187] __kmalloc_track_caller+0x79/0x370 [ 2072.952136] ? strndup_user+0x74/0xe0 [ 2072.952928] ? getname_flags.part.0+0x1dd/0x4f0 [ 2072.953899] memdup_user+0x22/0xd0 [ 2072.954654] strndup_user+0x74/0xe0 [ 2072.955416] __x64_sys_mount+0x133/0x300 [ 2072.956259] ? copy_mnt_ns+0xa00/0xa00 [ 2072.957085] do_syscall_64+0x33/0x40 [ 2072.957863] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2072.958935] RIP: 0033:0x7f138836c04a [ 2072.959702] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2072.963515] RSP: 002b:00007f13858befa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2072.965087] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2072.966572] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2072.968044] RBP: 00007f13858bf040 R08: 00007f13858bf040 R09: 0000000020000040 [ 2072.969517] R10: 0000000000020020 R11: 0000000000000202 R12: 0000000020000040 [ 2072.970997] R13: 00000000200000c0 R14: 00007f13858bf000 R15: 0000000020000140 22:28:54 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) lseek(r0, 0x100000000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:28:54 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:54 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:54 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x0, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:28:54 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:54 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:28:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 5) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2073.173713] FAULT_INJECTION: forcing a failure. [ 2073.173713] name failslab, interval 1, probability 0, space 0, times 0 [ 2073.175256] CPU: 0 PID: 10642 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2073.176221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2073.177374] Call Trace: [ 2073.177677] dump_stack+0x107/0x167 [ 2073.178184] should_fail.cold+0x5/0xa [ 2073.178714] ? create_object.isra.0+0x3a/0xa20 [ 2073.179354] should_failslab+0x5/0x20 [ 2073.179885] kmem_cache_alloc+0x5b/0x310 [ 2073.180459] create_object.isra.0+0x3a/0xa20 [ 2073.181070] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2073.181790] __kmalloc_track_caller+0x177/0x370 [ 2073.182447] ? strndup_user+0x74/0xe0 [ 2073.182980] ? getname_flags.part.0+0x1dd/0x4f0 [ 2073.183640] memdup_user+0x22/0xd0 [ 2073.184133] strndup_user+0x74/0xe0 [ 2073.184635] __x64_sys_mount+0x133/0x300 [ 2073.185207] ? copy_mnt_ns+0xa00/0xa00 [ 2073.185756] do_syscall_64+0x33/0x40 [ 2073.186285] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2073.187015] RIP: 0033:0x7f138836c04a [ 2073.187542] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2073.190144] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2073.191212] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2073.192207] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2073.193209] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2073.194218] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2073.194994] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:29:08 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:08 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 6) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:08 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:08 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fremovexattr(r0, &(0x7f0000000140)=@random={'user.', '\x00'}) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000080), 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0)=0x20, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=0x492, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @broadcast}, 0x10) io_uring_enter(r2, 0x59d1, 0xdcea, 0x1, &(0x7f0000000000)={[0x8]}, 0x8) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, &(0x7f0000000300)) 22:29:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:08 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000200)={[{@size={'size', 0x3d, [0x67, 0x33]}}, {@huge_within_size}, {@size={'size', 0x3d, [0x34, 0x70]}}, {@huge_never}, {@size={'size', 0x3d, [0x78, 0x38, 0x25, 0x39, 0x35]}}, {@mode={'mode', 0x3d, 0x4}}, {@gid={'gid', 0x3d, 0xee00}}]}) [ 2087.355947] FAULT_INJECTION: forcing a failure. [ 2087.355947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2087.357503] CPU: 1 PID: 10662 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2087.358288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2087.359239] Call Trace: [ 2087.359545] dump_stack+0x107/0x167 [ 2087.359962] should_fail.cold+0x5/0xa [ 2087.360401] _copy_from_user+0x2e/0x1b0 [ 2087.360857] memdup_user+0x65/0xd0 [ 2087.361259] strndup_user+0x74/0xe0 [ 2087.361674] __x64_sys_mount+0x133/0x300 [ 2087.362137] ? copy_mnt_ns+0xa00/0xa00 [ 2087.362591] do_syscall_64+0x33/0x40 [ 2087.363020] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2087.363608] RIP: 0033:0x7f138836c04a [ 2087.364044] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2087.366159] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2087.367035] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2087.367846] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2087.368657] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2087.369469] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2087.370283] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:29:08 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 7) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2087.408489] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2087.420873] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2087.472636] FAULT_INJECTION: forcing a failure. [ 2087.472636] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.475135] CPU: 0 PID: 10672 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2087.476517] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2087.478152] Call Trace: [ 2087.478694] dump_stack+0x107/0x167 [ 2087.479423] should_fail.cold+0x5/0xa [ 2087.480187] ? copy_mount_options+0x55/0x180 [ 2087.481066] should_failslab+0x5/0x20 [ 2087.481835] kmem_cache_alloc_trace+0x55/0x320 [ 2087.482749] ? _copy_from_user+0xfb/0x1b0 [ 2087.483584] copy_mount_options+0x55/0x180 [ 2087.484432] __x64_sys_mount+0x1a8/0x300 [ 2087.485240] ? copy_mnt_ns+0xa00/0xa00 [ 2087.486031] do_syscall_64+0x33/0x40 [ 2087.486788] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2087.487810] RIP: 0033:0x7f138836c04a [ 2087.488547] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2087.492229] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2087.493745] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2087.495169] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2087.496595] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2087.498011] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2087.499439] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 [ 2103.853796] FAULT_INJECTION: forcing a failure. [ 2103.853796] name failslab, interval 1, probability 0, space 0, times 0 [ 2103.856526] CPU: 1 PID: 10685 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2103.857996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2103.859746] Call Trace: [ 2103.860306] dump_stack+0x107/0x167 [ 2103.861079] should_fail.cold+0x5/0xa [ 2103.861889] ? create_object.isra.0+0x3a/0xa20 [ 2103.862865] should_failslab+0x5/0x20 [ 2103.863670] kmem_cache_alloc+0x5b/0x310 [ 2103.864532] create_object.isra.0+0x3a/0xa20 [ 2103.865449] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2103.866522] kmem_cache_alloc_trace+0x151/0x320 [ 2103.867513] copy_mount_options+0x55/0x180 [ 2103.868397] __x64_sys_mount+0x1a8/0x300 [ 2103.869237] ? copy_mnt_ns+0xa00/0xa00 [ 2103.870064] do_syscall_64+0x33/0x40 [ 2103.870841] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2103.871928] RIP: 0033:0x7f138836c04a [ 2103.872717] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2103.876845] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2103.878655] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a 22:29:24 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 8) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x278580, 0x0) bind$unix(r0, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f00000001c0)=ANY=[@ANYBLOB="0d2c6c4f2e3400c11284472791194d73426db605adc8df09a429059dd05c79062842387872b9267760497977339f2cc8aa849de49369cdea0972371552f6ab3a07b586728bca877914fb5fb51d1d1565661d5f5a07db65814542658889562163184eef486d3f74cf024af4d7e602fc21601f5a0edd6e2304cfbb"]) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x8, 0x3) 22:29:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) r2 = openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x40000, 0xc, 0x1e}, 0x18) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000001c0)={0xd30, 0x2, 'client1\x00', 0x5, "5bf242cb7c00ed83", "4f801173c4ee10a96a12104aaa2c5d70731790c2d2613edf2db2869d51af7b5e", 0x10001, 0xd2}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES64=r1], 0x24}}, 0x0) 22:29:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2103.880731] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2103.882589] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2103.884283] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2103.886024] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:29:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:25 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x1000, 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/199) readlink(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)=""/4096, 0x1000) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)=ANY=[@ANYBLOB="be"]) 22:29:25 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:25 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x0, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:25 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 9) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:25 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:25 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2104.240907] FAULT_INJECTION: forcing a failure. [ 2104.240907] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2104.242855] CPU: 0 PID: 10716 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2104.243921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2104.245099] Call Trace: [ 2104.245499] dump_stack+0x107/0x167 [ 2104.246035] should_fail.cold+0x5/0xa [ 2104.246612] _copy_from_user+0x2e/0x1b0 [ 2104.247248] copy_mount_options+0x76/0x180 [ 2104.247861] __x64_sys_mount+0x1a8/0x300 [ 2104.248454] ? copy_mnt_ns+0xa00/0xa00 [ 2104.249019] do_syscall_64+0x33/0x40 [ 2104.249564] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2104.250311] RIP: 0033:0x7f138836c04a [ 2104.250842] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2104.253530] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2104.254628] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2104.255664] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2104.256695] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2104.257728] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2104.258750] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:29:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 10) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x10001, 0x0, &(0x7f00000002c0), 0x280881, &(0x7f0000002d40)=ANY=[@ANYBLOB="6e6e6f6e756d746152a71154074a61c5b8b130c29c696c3d312c66736e616d653d66756e632d736d61636b6673726f6f743d682f2c726f6f74636f6e746578743d726f6f742c63676e746578743d756e636f6e66696e65645f752c636f6eff6578743d756e636f6e66696e65645f752c7569643c", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC=r0, @ANYBLOB=',uid<', @ANYRESDEC=0xee01, @ANYBLOB=',smackfsfloor={^,\x00']) r1 = add_key$fscrypt_provisioning(&(0x7f0000002a80), &(0x7f0000002ac0)={'syz', 0x1}, &(0x7f0000002c80)=ANY=[@ANYBLOB="01000000000000003f163a1c3b11352eb964474d8f56cf1d1c88a5aba32a020e3275a7d03697f82c0fb93c09cb90a7c000a3887675295f022deb47c5b4c1fcff5d0f52a3c19f7273ac8c3e56e52fd5301b5b713e2fb4952a57cbd334892feab8a2b92f01e3b9e0527a8a0b65293aa40108f5f8504af12a05970629c9f1f24dde9d3a732bc2f9bcd8fab19309a2496b7ce23d0ee58bff8c835952f976f8d6d89ada8ddd83f2000000000000"], 0x12, 0xffffffffffffffff) keyctl$chown(0x4, r1, r0, 0xee00) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='tracefs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002980), &(0x7f00000029c0)=0xc) syz_mount_image$nfs4(&(0x7f0000000300), &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x3, &(0x7f0000002b00)=[{&(0x7f0000000380)="d3564d853945ebbe789aef16e058795258b8f6c15bb743a53382ed16e8390ebc99dc3db28601ed2c76133770ed9c1b6b37da53c4fecd615cd286a87c9102", 0x3e, 0x3}, {&(0x7f0000002840)="0f154dd608d369c891743fafa376cd1d4748b21c3eba19b4587ba3972eff0747ea3084eb887f3fa4e2e2c53943ff20cde45104643f106f3dd22fd86b6bbe1405a5e865237b4e5e4a7a0a627fe751213eefc9807c099ebf53e1102fc608dfc7287a15efc695f920e00b46a47e1e", 0x6d, 0x40}, {&(0x7f00000028c0)="e022b3c38b11f1bb844797291ac23582037e079720a14d51d750744a069280fe12a61d", 0x23, 0x2}], 0x400, &(0x7f0000002a00)={[{'*-'}]}) lstat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r3, 0x0) setresuid(0xffffffffffffffff, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r4, 0x0) setresuid(0xffffffffffffffff, r4, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)=ANY=[@ANYBLOB='nr_blocks=6m,nr_inodes=,gid=', @ANYRESHEX, @ANYBLOB=',uid=', @ANYRESHEX=r2, @ANYBLOB=',mpol=default:8-,huge=never,huge=always,mode=00000000000070000000000,dont_measure,fowner=', @ANYRESDEC=r4, @ANYBLOB=',uid<', @ANYRESDEC=r0, @ANYBLOB=',subj_type={^.\x00']) syz_mount_image$tmpfs(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x3, 0x7, &(0x7f00000026c0)=[{&(0x7f0000000480)="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", 0x1000, 0x80000000}, {&(0x7f0000001480)="33d87f79d14e51ec3aca67c9890d8a15404d25db7be27c011b466c5e021690150126855da2cfe2498a28e5652190f4fb7fa639d1382f08993fbaf8100f4d4f838390ee4d023fa72d10aa9b21c518a6f7d9a6a2a5ef156a1ede80111b2b056c98571879f9723d5400df65026dd4b8b6163ab0b7bdbf7ecaccca97be2015ef9d53f5a81c408820829ecd700fa4d5cee561f9e5b0dea473dfaad2cb81739a21177b84d65afb467cce165b01a9d552648a9c7994f64bdb", 0xb5, 0x8}, {&(0x7f0000001540)="bfdea59c72315b3a1afc5a7e5a4bd3ca139eced13510742b7c8bf7aeb6b7d9e36832d04b9a61af8223ad70808e36721004395af1e6720589429cc35db765d3e766fa7dba69178cf7ed4269a63c68e401755b4e25f82333e340a98f5c777c97477ff9b725d943a655592efe", 0x6b, 0x80}, {&(0x7f00000015c0)="a7836f1bf81bda468b08a84d31274bb4525309ada06689442e9b6f22e74f44fab9c35fb7c17dd7479f1f202fa44cdb8d872fc66f7a6956f6dd180557dd961996c2caefd0febaa5a69a83bef60e9076fb51e4b10ac297d303c3dbfa09aca4dba9aad6f741cde50e4ec1b0995bd68376b0a82262c67622b7bf490a4fb2c71a361e8f344d82bb2d1039641d39f2eb9095c30206e6f09a308cfd22bede5c2b774e7a91858be33bfe59b8c6b92c433c35ee346872dd65dc61cab860ceb11d006dad7b595f7b57d6a7b05b2a0dc1bc02af9075ce3c858e35b74afd63a9e1c993c30d97b5c9bce92ff0436adc115f670910257443ee78053eab6b28d39be31a04c86bbfec0094c960fbda265f8e472997cd5121443adeeaa78c8f51b252364ae2ff45d389ebf9e5ffa205720bc1fc64ee560578d3383c3006126a111206e8aa3c2e621bdbad0b4151f76a713d4976076e6dab1abd4728919fe00330cf7fe9e086038cf6a28bb6e93acb3012bdbbeb0a56fc285e399824f98075121ef85cd25e737c7a4f574ac851dce141963f5a257ab733b28e37092ebfc0102eef9e678b0eaba2a6cf73bac4a66f65fc5695e1def34bc9cb4323adc61303bd9c2728d65e01122197e81a185081d9bc0b9c84e1414b3f17e93252b45bc2d3a4bd0b5dd3e313218c4b0a09c58760006e226d28c114a1a738607fc91103d6e5896f9eb5afdb7306d8e25a84b819f591365921dfad7e4b4cd51306209c82b776d07c695cd19e4b62f1bf37934ac420876aea46b785399c4460baafea16e3e627684842dbf0c372c03c7cfd9b071c7dda966fe18daa4d68a3f4533b5f810364705006168bd0e7ac9b8460529d2c6221ad7a278e3878cd1a07d2b7de4aac39564fc30f5fae2cddd2599bf6e2229950e57758bdb13e198b76ab4e0a027e1db943ba32d71eae45b10211d0c9755926d92c7a65b7c8735d5d999f219df8b425c5863d4268bf318feb8a982673751a1aef93f8120b5dd7c232348588d2400b7cdfc6a4917b54a7d393086675367966a03616f0e3de222996c5cfa4b6504e11f0b522918c6c452b061d4018f6b3f20554f43ed53f413558e1f217a9f40c4acc621ef6565ceebaf091cb7eb9fa506d659bf3585e272ca6771e8ea0fbf3678e7319d9f9d7d1684eef984fcd6051f77078a6ff12d76bd324533b57cc82e5b1c0ec140d5b2845be437c70c452300fb3403cf34a63604a7665a4d2fa7e7aeca6a48d7c170aae3ccbdae16fc2b01a4da541ca439138f855361b20ab91cc295e13ca1b5fca57f8e169cfb827c3c8a50d6ae5af895f0b3b25a41468254c2070bcea86bc81b8790d7e9586485c3de49c2b1840846a0eff526e55257a1d9a4286c185ac0e3e1470090b3004baa921a5b0ffd72a8bd3cdbca7e527bbafcd4e4b3c19046d829460f7271ed37d8ab4a471714b86c309d59724878de302270afa690ae43ad69fcb67f8fc71666a0cb6e3053940dd27631ce3f7b262f9729b32dd0a95a22ca321c15ec7fd1c33897a5a32b02d46fd7054fb79d968fa3e900f0439f705c0d1c0817b7de59b460a88d32eae5da5643f367806099e9182679df0fabc11284415d3dcbfabc034dcb4d337421e5c703a243aef519c9e749882835f1b0c0711d5fc9057ad29b9a14197110be31d5209a55caed137dca4ed67c3f779068f67bdf949c967b2eecf5c413b2fe54fd2e8a4d00e88b31fa366f3350dcefe157745b6530a62ecbec05ec361cd035258eff3dd7da3a7465f238bc8c6bd6f1d4620ccf3bb015647451788ee7e04d60061d05f1b068e5d945cc1da5cdee646dae74e43920f433ae9ce5cd567ef4d1591129593907d5a54f18f5f600a08cf3d2c3eeb688d0c81e8a343e387892db7a0462f3a4480cb1c934358d74eabdc3f5c204029d6677d950e610a1d0a66d53f6a972d4452edb9b2d61576ba5224dd7c636ac6465752b2af0c9897fc60fa803c572fbb79760b79b17b6fd01809e761822bf1c6e31950d7c89853c84b7470dde7721cafe86c590845753757c001257465eb4c63b0a037ba6649c3de9305eaabaa3f683e58c077703986bcb1164e1ad3a7df02dfce4cd54b759b04cb2a51a2bf0fee3ec1c691935c94d4a57df6b9b3f97deeafe4241852f047be0710b61c6c32957596e00fc5da5da1b1e0a75052ad93936cfb4d81401b068c4bdf4dd6cf59f2642ea218ccea6faa4fc8a4f7cdae43bc15c7322b551b54152a699205ff686b3b0c8ae74ee49b6865370cbb71ff8a6db0e8666d947a775d84399f27a34ffe6c7e59c911c4b19a21ed419ee4f82fa59849d7677592964e36279052a27c6eb6c48a47881a4ecb80982fd913287b8eafc2f4f3d8890dc60f19381cd23ccd9816261aeafc852377105f4d481d93cda1b36eaf6ef77656a6ee2d2ac9c7f0b43c5b472ffd391afbc0560577f0de4fcd7c248851499b3a254f80048d43164567724a2acea6de22203c3e86f98564eca1699fea25436f0a4ac8d7668fedeb82cf3798fa4b0b88d2cc362dbeaf9f18f6e4b4a3832f2a0f7b2648ccbf24270863ce76ad93e9c378bccd362611298f406b82b3ca0566c163441a5d823e790d3b866556911011c06820211f3299f8bd70c8b690c82e29aa29d1081ad8576abc7f51d3f9ee097186e9c73df4967dece1cefce97eacdd52c433b15f0843a965272a6c40cd9694e55e697a0a2526cc917b81e201dd79be93c874c705b7598d19177c560b0218dd79943907c45146da35cb5f2a141c43f265770a3daffade8ef55ca927b1d80789ae1a0524bba893a7e001de3dab076139c39268ff60521308b48388764c2e77a4c4a97857b39c5bf9b508b3e75e715aabadf998a505398c164f91d92c3715da7cd1985f1ff2b722e0ac05244242d05c0c603658ec836d6ee824f963f68ae99e4f2d6f924dd4e6bf3cf9aae3ba7a1d90803ac8c5578a1a0b7186c5940b95d3568a1455ff250aabf0dfd24db3b97d1e0a8a8d006f4c443a7223e0b7c4807fd2fdfac49e410ae0cdf535f81b9c26a225a7829dde8236497d0f9c0a37c01bd2b8d79e4181674c7d4a77eef92dcc223aef1152aaad9095cf267a3cf6fa0e87e16949b4ca1eb0c2aba11fbfc425d3ee569670c8c6e002ce813caeca14d4f303791388c14b2f88cfee491bcccf9340a25656705161158f97bb0adfbb3733a35bac61cbec804cadb6cbe1ea42e1c7ac0404fbf06b989c33851dc2b593168845807f74977596aa7fbc1c1699d95e6c25a7ceeb8489eac80eb5c5e1e44da973f5d97f9e178c0a995053acd972e6d803483073af71f098c9aab89c54eb4c800ff04b2cc4475f2719eae593c9a005f7eab2357534bd7ccd845f4aede21280ccbecf82f01519569616d23c8372f822c3f9aea83423552d24d31a6752ad8d1a5c017f6b9c4fb99045159a4f6d6f8e392c4aa242cf9dbd3e60a5c581aa0088f0fc34b33179cbff231212cdb2b501bf72f966c2c418aa98725ff4efb8dd83f88a7b4476a6e744a0e14fafa83fc217b99aabe2d0dc8125f0db867fe0e8d831f380f4f9008070eceb56b0ca8f99bde1d67036b915a53925205fb5f413b26d256f03595e1eb8071dd86a00d1a4f8d7639dea5f75b3599cc366fdeca1e72eb6faa48e350893d67fd67532a3efedca5e5988c54e88b1a0e0e1d7db1f7299b1a5bfe1266a6179955eeb53369911205e54f84ea15533f74ebd8670f559bfbff01f20dff097d117ea4b4fb08f142da3520110c2bf85f10112534c22798cee0255a9f25a1c1b26ef3892d372839db720ee4e12ea86c440bbf9882dcff4590b6d256a79e015fec05637162627d29360cad02d9bdf5a3eafed304f83568c23825f12ec27249f2abee6429615a45c11a0fed086d2b9f1a6176a18cc8fc63dc0d1e6f1bdd1b4c3d26bfea39558c4325ceecb5e324f20ecaec01c3b6f813e9504405f5ebf371ecc6b4540f70f82daea7e65b7bf538de434282d4c744f77e59f4b029f2534852db2bf52782d6c2585b22d7570d578d2c7732275aae92cf027d6483287a8d43e14c0f8f2e45e02accd5827cc2965939002c3ee17667e914f57ebd3cd973d20098b64299ab477c254fc069fd87cdb06b8f93d5cbd78e5d5cfd99b5823e26933e65d6b327bca80b06bd82c12dd42af2f1bd9331f645763e704c30a4c476fbd43395f6a96b58ce7becf8cf70e44f001ee0b7ed700b0f6cb6cd4a2f557f2aab8b2401bac190e31dd4668daeca3f6bee384e54ae899d8671a65ec43c82f2b08517d13ec16f32682076885200c525a2153604c0be00e75aece40529625d72270755eba401c2162f195076fa551a8d1f314607faa17332d0958a1a7f539de6d1d94434b1860789fd434b9ef59344ef341613dee20d895902ffa535d000b310d5e48076b53bb6d23f61bd61747d7a1d7cc448aabaf4b790e981d83220c824c3a7e978a02935c210dd06d9b69ba57bd77c56ea0bef4ebdaddf4513a2952e8a7860733d6ab472f46f093f8bc4b027c8b45ed41c2bbabacf4e41cab618846f89fac8fe86e1042439599fab54e3b3a5d1b6da5c4b592dab59e8d03496e2ec4e5b7cd341021cdfb16a8179b411b1c63b722fb45abc875ffa19d1a20852a68e266dba54c68d5de02660e8811f9eed770e07f501956636899b157ae1f0b34387a7a17c07f8bcc406109a065acc4f468252a85a2f39e103e157fcc0e9241185efcc9d408e4e03c851fd5d61970a06e450406d9dd3ea367fd3dbe77e2b8a0c47f2c190634e4ff33f2b1f3449334c453178f5dfafd6c90982858017b895f669d15ad4b1801368c7ca8781a90b905a79f5e0d8ae704fad1246f37bc896d811fe58008055a5d9dfaf4ce70b43d530a6177bfdb7f5e185c7f059d1e6aa4f1d9c0e8e4224aaf12eec27fd67ca49ed8421f572fe06dc4c811227871d3315afb178b05a5270d2bb3aac6ce40f6044f5305c69e6a3464be33a93bc81b0b57d321fd7111f4b7bbda0564789126e0321d679bd1f00395f4441d547b84ae1221cb65ecf8fdb1e2bd27ef0d5c90c3d32f66e396dedac12f88be08c16d964b1861ba96301898965d7d1d305aa5de2cea2e8dfdecd9aaf24b9fbf93eb68c5876db8ad3d34d58db10e3431e12ebcb6541330e4faea2026e48c7e732788444b3ed2c068f3617417ea3d677f6a73cb4bd94479636c1e66d54266551d0c16970b27c0ab489a12a74e9597ecf804983d1d3dcfaf5b5da23a0e3eb557f89cbfdae815a706456c4d5dbe77cb0d8dbc6164eb59588c8d9b0cb0d82fbbc3227b57786e2e22f5b236f5c64264b12da8425f9b250bcdf53e2a69b2f4bffce485f0214b85c22cd1e144a53ff0f053dcebc5667fe6104a51476719b9bc13714201c84627343dd2d5173a13fd5a36fb34a0d405c38cc7f2a7bbc51b3a34380efe2accb4c2ee6b7871bd6a2d050c9fa6e656f318e33a9262c17955d84c35fc4e7f7862dc231adece8749ae8316418c5926440bfbc147c7ed7c41bf3622acfd918e844a38922450056bdf04051e58a05ea33ff3b35585ad48732515b755dc3d14c3097209840961581188f6ae37c5d10b3b5d01ec521c2afc96c5b83b80ed529b71c937a8ff3a5afb469214fd66ba3a57bb8cdd9bf2cd9a08eb997931a0754ed4c60af94dfa8c445ad416ec01a9c5857bd4c45807d421e649b2afb8dd95254fef9931a214840a5cc85662bf4a4f33fdc5564222eb1519f6776924eca51cffcc70b2f547456c1d057aee422127019dde5e2055ef8bc6fdb0e170ad5a5a6b2d3ba4c0fdb1f67e3460f84da2d250", 0x1000, 0x29b}, {&(0x7f00000025c0)="e56fc8", 0x3, 0xfc2c}, {&(0x7f0000002600)="e1fe46e935e276c6e941edb72985dddb6e49fb11ecefe580731ad7819e449987807059e9b8e12db834d38fbab97e92", 0x2f}, {&(0x7f0000002640)="75e2e0df87291dab006149a09e0f030a562e50ec3aba31f36418e8b1f490e50e74cf582a1070cace4969b1d98ae2aad4f98dc831fc87cc52f8f35f534e8be0417c34244a46b9cbe31521e731a05b", 0x4e, 0x1a}], 0x0, &(0x7f0000002780)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x32, 0x33, 0x73, 0x78, 0x2d, 0x33]}}, {@mode={'mode', 0x3d, 0x100000000}}], [{@smackfshat={'smackfshat', 0x3d, '*}.],L{$\'E%'}}, {@fsmagic={'fsmagic', 0x3d, 0x80000000080176}}, {@fowner_gt={'fowner>', r0}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@seclabel}]}) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r5, 0x0, &(0x7f00000003c0)=@IORING_OP_POLL_REMOVE={0x7, 0x1}, 0x4) 22:29:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000300)=[{&(0x7f00000001c0)="b7de1d7be94aea9b037c457ff521dc65e62659c964d686daeaf608b7ed235ed3f74ea813ec5793c22213f721e9c825674ea40feb05", 0x35, 0xfffffffffffff800}, {&(0x7f0000000200)="7714fe20fc3676687cf58f3e674e1d1dc199943003d3b2ea763a1cf3629441844792419f7e0e4ff23cffb0e1352427f2b9b93949c82682181251eba0d7c15f9be0bc19b57267171bd8d6a853aa77ca8ef736e99279a29da437a22448ee1636baa0bb816ca79a358603ea5603a12e3fe33c89a414a5e1ea9589756e0e3b0e5de4b2beecdd0d2b51f843ab4a482bf539c84cccd0a06594b9d0723ef17d26b89b7315bc041d5d37023dcac51944c4d059c87b4006d3a4bf474217306dad0084ca60676d7a5cbfcb00081545217c91", 0xcd, 0x9}], 0x444400, &(0x7f0000000340)=ANY=[@ANYBLOB="24402f2d8a2e282c6c232c2423fd2c327d90326d8361070000002c12"]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000380)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000049d40)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049f40)={0x4, [{r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {0x0, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5}, {r5, r4}, {}, {0x0, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {0x0, r4}, {0x0, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5}, {r5}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {0x0, r4}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}], 0x2, "6fc5523113917c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f000004af40)={r4, r5, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f000004bf40)={{r5, 0xfff, 0xffff, 0x9, 0x1, 0xfffffffffffffff7, 0x1000, 0x3, 0x101, 0x4, 0x5, 0x101, 0x7, 0xf0, 0x1f}, 0x8, [0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004bfc0)={0x100, [{r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {0x0, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {0x0, r4}, {r5, r4}, {}, {r5, r4}, {r5}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}], 0x9, "6710f2973a34fa"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004cfc0)={0x98, [{r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {0x0, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {0x0, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {0x0, r4}, {r5, r4}, {r5}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {0x0, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5}, {r5, r4}, {r5, r4}], 0x8, "7417c8e602c25b"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000643c0)={0x80, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}], 0x8, "09e202ffff00"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004dfc0)={0x0, [{}, {}, {}, {}, {r5, r4}, {0x0, r4}, {}, {0x0, r4}, {r5, r4}, {0x0, r4}, {0x0, r4}, {r5}, {}, {}, {r5}, {0x0, r4}, {0x0, r4}, {}, {r5, r4}, {}, {0x0, r4}, {r5}, {}, {r5}, {r5, r4}, {r5}, {}, {r5}, {0x0, r4}, {r5}, {r5, r4}, {0x0, r4}, {0x0, r4}, {}, {r5}, {0x0, r4}, {0x0, r4}, {}, {0x0, r4}, {r5}, {r5, r4}, {}, {}, {0x0, r4}, {0x0, r4}, {r5, r4}, {}, {r5, r4}, {}, {r5, r4}, {r5, r4}, {r5}, {0x0, r4}, {}, {}, {0x0, r4}, {r5}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r5, r4}, {}, {}, {}, {r5, r4}, {0x0, r4}, {r5, r4}, {0x0, r4}, {0x0, r4}, {r5}, {r5, r4}, {r5}, {}, {r5}, {r5, r4}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {r5}, {}, {r5}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r5, r4}, {r5}, {0x0, r4}, {}, {r5}, {r5, r4}, {}, {r5, r4}, {0x0, r4}, {}, {r5, r4}, {r5}, {}, {r5, r4}, {}, {r5}, {r5}, {}, {}, {0x0, r4}, {}, {r5, r4}, {r5}, {}, {0x0, r4}, {}, {}, {r5, r4}, {}, {0x0, r4}, {}, {r5, r4}, {r5}, {r5, r4}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {r5, r4}, {}, {r5}, {}, {}, {}, {0x0, r4}, {}, {r5}, {r5}, {}, {r5}, {0x0, r4}, {r5}, {r5, r4}, {r5}, {}, {}, {r5, r4}, {r5, r4}, {}, {}, {r5, r4}, {r5}, {}, {}, {r5, r4}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r5}, {r5, r4}, {r5}, {}, {r5}, {0x0, r4}, {r5}, {r5, r4}, {r5, r4}, {r5}, {r5}, {r5}, {r5}, {r5, r4}, {0x0, r4}, {}, {}, {r5, r4}, {}, {0x0, r4}, {r5}, {}, {r5}, {r5}, {r5, r4}, {r5}, {}, {r5, r4}, {}, {r5, r4}, {r5}, {0x0, r4}, {r5, r4}, {r5, r4}, {0x0, r4}, {r5}, {}, {}, {0x0, r4}, {r5, r4}, {r5, r4}, {}, {r5, r4}, {r5}, {}, {r5, r4}, {}, {r5}, {r5}, {r5}, {}, {}, {r5}, {r5}, {}, {0x0, r4}, {}, {r5}, {}, {r5}, {r5}, {r5}, {0x0, r4}, {r5}, {}, {r5, r4}, {r5, r4}, {}, {}, {0x0, r4}, {r5, r4}, {r5, r4}, {r5}, {r5}, {r5, r4}, {r5, r4}, {r5, r4}, {}, {}, {0x0, r4}, {}, {r5}, {}, {}, {r5, r4}, {r5, r4}, {0x0, r7}, {r5}, {r5, r4}, {0x0, r4}, {r8, r4}, {r5, r9}, {r10, r4}, {r11, r4}, {r5, r12}, {r5, r14}, {r5, r16}], 0xdb, "529d37b21de59f"}) ioctl$BTRFS_IOC_INO_LOOKUP(r3, 0xd0009412, &(0x7f0000001e00)={r5, 0x5b}) bind$unix(r1, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r2, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 22:29:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2118.509577] FAULT_INJECTION: forcing a failure. [ 2118.509577] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.512362] CPU: 0 PID: 10734 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2118.513974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2118.515918] Call Trace: 22:29:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2118.516531] dump_stack+0x107/0x167 [ 2118.517485] should_fail.cold+0x5/0xa [ 2118.518375] ? getname_flags.part.0+0x50/0x4f0 [ 2118.519432] should_failslab+0x5/0x20 [ 2118.520324] kmem_cache_alloc+0x5b/0x310 [ 2118.521262] getname_flags.part.0+0x50/0x4f0 [ 2118.522279] user_path_at_empty+0xa1/0x100 [ 2118.523255] __x64_sys_mount+0x1e9/0x300 [ 2118.524208] ? copy_mnt_ns+0xa00/0xa00 [ 2118.525122] do_syscall_64+0x33/0x40 [ 2118.525986] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2118.527159] RIP: 0033:0x7f138836c04a [ 2118.528035] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2118.532315] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2118.534071] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2118.535718] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2118.537363] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2118.538998] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2118.540634] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 [ 2118.554823] tmpfs: Bad value for 'nr_inodes' 22:29:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0x0, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@huge_within_size}, {@huge_advise}, {@size={'size', 0x3d, [0x6b, 0x65, 0x43, 0x6d, 0x65, 0x36, 0x6d]}}]}) 22:29:39 executing program 0: r0 = perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x81, 0x1, 0x2b, 0x0, 0x50d, 0x9c209, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x40009, 0x3f, 0x3, 0x1, 0x8001, 0xa97, 0x7f, 0x0, 0xe5, 0x0, 0x80000000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000240)={0x1495c5bd, 0x8, 0x2, 0x5, 0x3, [{0x6f, 0x20b2bacb, 0x5, '\x00', 0x100}, {0x6, 0x80, 0x6, '\x00', 0x8}, {0x8000, 0x1ff, 0x2, '\x00', 0x82}]}) mknod$loop(&(0x7f0000001d40)='./file0\x00', 0x6000, 0x0) acct(&(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) 22:29:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 11) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2118.869749] FAULT_INJECTION: forcing a failure. [ 2118.869749] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.871323] CPU: 1 PID: 10773 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2118.872143] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2118.873110] Call Trace: [ 2118.873418] dump_stack+0x107/0x167 [ 2118.873834] should_fail.cold+0x5/0xa [ 2118.874274] ? create_object.isra.0+0x3a/0xa20 [ 2118.874802] should_failslab+0x5/0x20 [ 2118.875237] kmem_cache_alloc+0x5b/0x310 [ 2118.875708] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2118.876308] create_object.isra.0+0x3a/0xa20 [ 2118.876825] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2118.877430] kmem_cache_alloc+0x159/0x310 [ 2118.877920] getname_flags.part.0+0x50/0x4f0 [ 2118.878440] user_path_at_empty+0xa1/0x100 [ 2118.878940] __x64_sys_mount+0x1e9/0x300 [ 2118.879415] ? copy_mnt_ns+0xa00/0xa00 [ 2118.879892] do_syscall_64+0x33/0x40 [ 2118.880332] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2118.880935] RIP: 0033:0x7f138836c04a [ 2118.881369] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2118.883532] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2118.884443] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2118.885257] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2118.886085] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2118.886926] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2118.887770] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:29:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$cgroup(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000440), 0x2210000, &(0x7f0000000480)={[{}, {@cpuset_v2_mode}], [{@dont_measure}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@pcr={'pcr', 0x3d, 0x28}}]}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x81, 0x0, &(0x7f0000000140), 0x260000, &(0x7f0000000380)={[{@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x37, 0x3a, 0x7, 0x30, 0x14, 0x39, 0x30, 0x2f]}}}}, {@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x33, 0x39, 0x34, 0x36, 0x3a, 0x39, 0x2c, 0x31, 0x32]}}}}], [{@dont_appraise}, {@uid_lt={'uid<', r0}}, {@smackfsdef={'smackfsdef', 0x3d, '\xb5.@*'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfshat={'smackfshat', 0x3d, '-@'}}, {@subj_user={'subj_user', 0x3d, 'tracefs\x00'}}, {@uid_gt={'uid>', r2}}]}) [ 2118.964657] cgroup: Unknown subsys name 'dont_measure' [ 2118.979966] cgroup: Unknown subsys name 'dont_measure' 22:29:52 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000000)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, 0x19, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x1e, 0x0, 0x0, @u32=0x10001}]}, 0x24}}, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x5, 0x0, 0xff, 0x3, 0x0, 0x2, 0x0, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xd721, 0x4, @perf_bp={&(0x7f0000000100)}, 0x20, 0x0, 0x27, 0x9, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x5}, 0x0, 0x4, r2, 0x8) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x200042, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f00000002c0)={0x5, 0x7f, 0x5f73, {0x6, 0x385f8000}, 0x1, 0x58a}) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f0000000200)=0x3) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000000)) 22:29:52 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='proc\x00', 0x81, &(0x7f0000000240)='tracefs\x00') 22:29:52 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 12) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:29:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:52 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:29:52 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2131.838416] proc: Unknown parameter 'tracefs' [ 2131.841963] proc: Unknown parameter 'tracefs' [ 2131.844953] FAULT_INJECTION: forcing a failure. [ 2131.844953] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2131.848404] CPU: 0 PID: 10799 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2131.850217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2131.852422] Call Trace: [ 2131.853132] dump_stack+0x107/0x167 [ 2131.854094] should_fail.cold+0x5/0xa [ 2131.855102] strncpy_from_user+0x34/0x470 [ 2131.856201] getname_flags.part.0+0x95/0x4f0 [ 2131.857382] user_path_at_empty+0xa1/0x100 [ 2131.858501] __x64_sys_mount+0x1e9/0x300 [ 2131.859561] ? copy_mnt_ns+0xa00/0xa00 [ 2131.860601] do_syscall_64+0x33/0x40 [ 2131.861571] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2131.862909] RIP: 0033:0x7f138836c04a [ 2131.863882] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2131.868938] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2131.870897] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2131.872790] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2131.874627] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2131.876491] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2131.878332] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:29:53 executing program 6: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000280)={0x2, 0x5, 0xcb, &(0x7f0000000180)=""/203}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x3, 0x3}, 'port0\x00', 0x10, 0x40400, 0x9, 0x7, 0x5, 0x44, 0x7fffffff, 0x0, 0x6, 0xe9}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa0020, &(0x7f0000000380)) 22:29:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 13) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2131.962901] FAULT_INJECTION: forcing a failure. [ 2131.962901] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2131.964710] CPU: 1 PID: 10812 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2131.965676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2131.966836] Call Trace: [ 2131.967218] dump_stack+0x107/0x167 [ 2131.967721] should_fail.cold+0x5/0xa [ 2131.968279] strncpy_from_user+0x34/0x470 [ 2131.968860] getname_flags.part.0+0x95/0x4f0 [ 2131.969478] user_path_at_empty+0xa1/0x100 [ 2131.970073] __x64_sys_mount+0x1e9/0x300 [ 2131.970646] ? copy_mnt_ns+0xa00/0xa00 [ 2131.971201] do_syscall_64+0x33/0x40 [ 2131.971725] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2131.972463] RIP: 0033:0x7f138836c04a [ 2131.972988] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2131.975587] RSP: 002b:00007f13858dffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2131.976672] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138836c04a [ 2131.977682] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2131.978685] RBP: 00007f13858e0040 R08: 00007f13858e0040 R09: 0000000020000040 [ 2131.979690] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2131.980700] R13: 00000000200000c0 R14: 00007f13858e0000 R15: 0000000020000140 22:29:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:07 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:07 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 14) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:07 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000000)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, 0x19, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x1e, 0x0, 0x0, @u32=0x10001}]}, 0x24}}, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x5, 0x0, 0xff, 0x3, 0x0, 0x2, 0x0, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xd721, 0x4, @perf_bp={&(0x7f0000000100)}, 0x20, 0x0, 0x27, 0x9, 0x0, 0x8, 0x0, 0x0, 0x3, 0x0, 0x5}, 0x0, 0x4, r2, 0x8) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x200042, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f00000002c0)={0x5, 0x7f, 0x5f73, {0x6, 0x385f8000}, 0x1, 0x58a}) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f0000000200)=0x3) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000000)) 22:30:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0/file0\x00', 0x501c02, 0x0) linkat(r0, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x1000) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/254, 0xfe, 0x81, &(0x7f0000000280)=@ieee802154={0x24, @short={0x2, 0x2, 0xfffe}}, 0x80) [ 2146.298765] FAULT_INJECTION: forcing a failure. [ 2146.298765] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2146.300389] CPU: 1 PID: 10841 Comm: syz-executor.4 Not tainted 5.10.232 #1 [ 2146.301250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2146.302244] Call Trace: [ 2146.302564] dump_stack+0x107/0x167 [ 2146.303007] should_fail.cold+0x5/0xa [ 2146.303472] _copy_from_user+0x2e/0x1b0 [ 2146.303951] kstrtouint_from_user+0xbd/0x220 [ 2146.304482] ? kstrtou8_from_user+0x210/0x210 [ 2146.305095] ? lock_acquire+0x197/0x470 [ 2146.305674] ? ksys_write+0x12d/0x260 [ 2146.306240] proc_fail_nth_write+0x78/0x220 [ 2146.306863] ? proc_task_getattr+0x1f0/0x1f0 [ 2146.307514] ? proc_task_getattr+0x1f0/0x1f0 [ 2146.308143] vfs_write+0x29a/0xb10 [ 2146.308675] ksys_write+0x12d/0x260 [ 2146.309216] ? __ia32_sys_read+0xb0/0xb0 [ 2146.309809] do_syscall_64+0x33/0x40 [ 2146.310354] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2146.311080] RIP: 0033:0x7f138831d5ff [ 2146.311567] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 2146.313809] RSP: 002b:00007f13858bf170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2146.314791] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f138831d5ff [ 2146.315662] RDX: 0000000000000001 RSI: 00007f13858bf1e0 RDI: 0000000000000004 [ 2146.316535] RBP: 00007f13858bf1d0 R08: 0000000000000000 R09: 0000000020000040 [ 2146.317420] R10: 0000000000020020 R11: 0000000000000293 R12: 0000000000000002 [ 2146.318268] R13: 00007fffdcef10ff R14: 00007f13858bf300 R15: 0000000000022000 22:30:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) 22:30:07 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:07 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000900)=ANY=[@ANYBLOB="000cd745b0343a96fe20c7428d724fd8cf646108a5d197067a8256456044f01cef5b4ab76bab4bd17a8ce712529304593b60fd09c9335cfacd7645294098bc02a5dbb2a23da2ff26bc9933605aa0d58ac13ccaed4ef9f97dd56a1be026db82508d1d8992550c8bbbc0"]) mount$9p_fd(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780), 0x4000, &(0x7f00000007c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@version_u}], [{@obj_role={'obj_role', 0x3d, 'POLICY_CHECK'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) r1 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r1, &(0x7f0000000140)='./file0\x00') openat2(r1, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x8}, 0x18) fchmodat(r1, &(0x7f0000000880)='./file0\x00', 0x20) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r2, 0x0) mknod(&(0x7f0000000840)='./file0\x00', 0x8000, 0xfffffffe) epoll_create1(0x0) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0xfff, 0x7, &(0x7f0000000540)=[{&(0x7f0000000200)="276632a46cf97d67de15d1c8c7d8fd5af2ed76b8a4b55d63f3555cc010cac4e8853f0fd6e36fac16f1214867ced2e4fea21eaaf2f59af0d1b5cd1ba09c3296173463dc8be1765b27472e02016345f9ac6fa547d9992ff47487ab91f43c5373cf6dfad5a914ac62740ab50d18623ebc64652491e529f27ff394ee4bbed69e49107a6d86a11c20b076b4518ba16e06793ad83c231dd567f7d5983ac1889dd9bc7374498f634c0940b872fa72f9d8ec4d75cb744537ce0485439f12a4f3d5a07973f3927eb9aed850f9c8612c6588b3513e029c0f6c924b56762dad82c50f370706195154f3002f47e50b852c4e5f70c280fe018aef3b731e93", 0xf8, 0x5}, {&(0x7f0000000300)="0d3f949e02d1598ce24e28", 0xb, 0xfffffffffffffffa}, {&(0x7f0000000340)="d3265c9dfa4c74243b8ba8eca1143ee7dbdf8fe9aa491534f4c88b14db18", 0x1e, 0x1}, {&(0x7f0000000380)="ec0a11ba67c90d2091bc1d4f7dd2b1b3b20b3fc9a4fa8433fa0c36c748824ea5a622a9c4d48187847b30d1f30f630e5637bb64a70b75931d5098e28459eb63cfdf716b60ce92530a4cb480b027b67fc2048a807c01ecc498798d238bd05cc0e3e03bcff69c6ac7d7c799dba02afe75dace62a2f9df6fec91664689a303f83080ec5eaa11cc3aabcfdeeab5d276", 0x8d, 0x3}, {&(0x7f0000000440)="b533c3", 0x3, 0x10000}, {&(0x7f0000000480)="ee", 0x1, 0x100}, {&(0x7f00000004c0)="0778e3c5e67bffb23a4ff5d7d845b43282319f14ac57f54a9559d55542647514e9414ef99368ac560b589aea155f45489880fad09371af8bf52be43702b297687dc84ea82c990b061faa781f5ea1451ceeff04e715cf959117f9c2e6d1a1778a0f482be9827f8c5eae54b5ed5256f9d064d2", 0x72, 0x400}], 0x2, &(0x7f0000000600)={[{@commit={'commit', 0x3d, 0xffffffffffffff00}}, {@i_version}, {@errors_continue}, {@noauto_da_alloc}, {@jqfmt_vfsv1}, {@noblock_validity}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type={'obj_type', 0x3d, 'tmpfs\x00'}}, {@subj_user={'subj_user', 0x3d, 'tracefs\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r2}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'tmpfs\x00'}}]}) 22:30:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:07 executing program 0: getitimer(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000100)={{}, {0x77359400}}, &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r0, &(0x7f0000000140)='./file0\x00') openat2(r0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x8}, 0x18) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0xea60}}, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x462) 22:30:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:07 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2146.532925] 9pnet: Insufficient options for proto=fd 22:30:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) 22:30:07 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2146.614507] tmpfs: Unknown parameter 'ext3' 22:30:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) 22:30:24 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000380), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x0, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x34}}, 0x800) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:30:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:24 executing program 0: getitimer(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000100)={{}, {0x77359400}}, &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r0, &(0x7f0000000140)='./file0\x00') openat2(r0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x8}, 0x18) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0xea60}}, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x462) 22:30:24 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) dup3(r0, r1, 0x80000) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x2d) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='securityfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000200)=ANY=[@ANYBLOB="00197e1cf494c58b28a7882e4cfe4329c223db89d378e0bb5edf13b037d6af072b443d9c12479b9f91a6d61426e2805e7bc18b9ec743cc49c56d5ac8ec9f68166be4df1e"]) 22:30:24 executing program 0: getitimer(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x1, &(0x7f0000000100)={{}, {0x77359400}}, &(0x7f0000000140)) r0 = syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) symlinkat(&(0x7f0000000100)='.\x00', r0, &(0x7f0000000140)='./file0\x00') openat2(r0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x8}, 0x18) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0xea60}}, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000600000000000000000000000000000000000000000000000000000000000000100000000000000000000000000030000000000000035d36b44d6e2bce5e517f624074e6b316d2062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521100e30e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea919d79f1fff071661808a50152ea21ebae4d6f13ac92e6dadeaee47299729a5202fff3cc46c16cb9c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a368f346afa0dff998b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac6714d723ca5c61c0b300ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c776d6fcf5663eae1dfcbb95856e9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac1512e7661e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507e658890cdc40b45f4e1ca7d0cd8a9b195b6f5deaf33630b8c3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662661490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168909ce25f566ac3491b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d0e1d99afb30f7544fc6e39d992aff26ba07b8baf5ae23d14b696c9db7c38ee40b20ff11aeecc8b43880ca5c0708069df6a4b2df19a0241750fc0a422d5df49ab94f98f1f09a49eee33553ddf23d83aea24f416bc68e6846be2db13be70bf4a5eedddf3a541a7b6341fd8a988ad7a248a33a9ee1adc00bc51248f834b43b7d9894ec8f4faeb3ae1ad98cb3a33eb27a07ec625520a3a9bc8b1af0fcd7b91d21dcb1c97077b9c4ad63d2c82"], 0x462) 22:30:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) 22:30:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:24 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:24 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) symlinkat(&(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') 22:30:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) 22:30:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) mount(&(0x7f0000000180)=@sg0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='mqueue\x00', 0x880000, &(0x7f0000000240)='tracefs\x00') syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:30:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001880)=""/102, 0x66}, {&(0x7f0000001900)=""/130, 0x82}, {&(0x7f00000019c0)=""/95, 0x5f}], 0x4) readv(r1, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000006c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000015c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="030c000000040000e3944dbec12891f15c2fa083d61ea9b7329af4e67a1929", @ANYRES32=r4, @ANYBLOB="10005e80080002000000000004000100"], 0x2c}}, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(r1, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYRES64]) getdents(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'U-', 0x7fffffff}, 0x16, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) fsetxattr$security_selinux(r5, &(0x7f0000000240), &(0x7f00000002c0)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x6a4e5309ea842515) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000014c0), 0x900, 0x0) getdents64(r6, &(0x7f0000001500)=""/125, 0x7d) unshare(0x48020200) 22:30:39 executing program 6: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000240)='./file0\x00', 0xfff, 0x7, &(0x7f0000000700)=[{&(0x7f0000000280)="4cd6b29e97844b69fc1a61051abb673f9bdfce9c6f0868b6471dae989fe70717d5a66341e9566fee14d5f7b4fef983846cce714ffb08c8e39c4bd0753626b2c87303128ef658c281c46d4719c5d777c5c0c2ac6e95293bfb03158ad5f69fefdaf7f156e67e27a5be619d74032df7d3360a7267b09a31fcd4cee528c90d7533341b95", 0x82, 0x20}, {&(0x7f0000000340)="e6da34d1fc9c25dd84a0bf60e0442b5fb974085ed12a0da102737533b84d4f260c87414f0380349e071468050a4038bd385cacdf189b115ff08151c9bd8a54763cfd3949b8a0210df18542feeb9a", 0x4e, 0x6}, {&(0x7f00000003c0)="a0b49683a53a3758bc34898f6cb1b11a56b4c7c62c830d85670c", 0x1a, 0x7}, {&(0x7f0000000400)="1198553eae8786a8c33b0f6ab57861285e945d287359793db130a7fe63e073b6fec664fc392b9cdbd1a1845d03814e862fbdf8bd82eaacfb5eebed703f855f9077932d48f8cd0a99dd9b315ed28519f2", 0x50, 0x4e}, {&(0x7f0000000480)="903d5b4ebf8c7702d13fdcd6b28fc9bb793972e816abbbd57b6c5e9d9876fb3417447837a188eac5c54acb979ef697371db1ab95f065ec8600b0a8f84a28b701d1e7430e4c1cf2f6d76f78f5f125ce7ab7c232683e8795bc09f9e0fe59f3aaad14153f5b16bad2ea64fd9e0f7725471f65aca55d5a34bb191ef06e363438e9cd28dde08af15d71c7589ec07b78fd993a778dfe1601caa81c574e58b98969b2644ada0bc1ddcc82007f1bba86eb623230ea88f79b987f8a0ecad803e080217b098d5a10ec", 0xc4, 0x20}, {&(0x7f0000000580)="d320d10a5cdc975c8ba76cba374e24f0b74fd71c3160f9cd0abd712aa463b921e350af55a19ac0a633edddbd077a39c338adf637f9bc2c55d2f0a4d2c445998b57d053caaaf8c28e5b6c469f4147458cf9ac785318217900ec511e1764c3ce8bac4bf2e8153dfcbb0e565b15c153947a3b4167ac54d8", 0x76, 0x1}, {&(0x7f0000000600)="086a7a0f96ff1a97bfbad30dde9e646c99b4f0f53b5850ae6222423678eba2882086bcba901eb1420c1292212d3a9afe2e9be4450a70e97222d99175ca6e5cc3e84d90f93637b30211b1878e834f4cf95e215cbc28f9f4eb965ce72cd8491ecac48c71d7b8d870d11b5ac55d0020089383c0912c9bef694635d7b33391e9ff4b29cc9d0a76f1468b945aa49746e27c9425efd011a71878373fa5b1fc3f3def5f72857dadecd96689e3111423be84375627703e88ef409abd936793f6448633fcb602bf6cfce806a2ae348e7e308401fa379e13c90800fac80ed935445932aa9b7a73e167ca4dfcb11ba2c8861b0f17d5e7ad7a870b36e0", 0xf7, 0x1f}], 0x1, &(0x7f00000007c0)={[{@journal_ioprio}, {@noauto_da_alloc}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', 0xee01}}, {@dont_measure}, {@smackfsroot}, {@fsname={'fsname', 0x3d, '-$--^'}}, {@fsname={'fsname', 0x3d, '%+.&[,@\\\')'}}]}) openat(r0, &(0x7f00000001c0)='./file1\x00', 0x210a02, 0x10c) 22:30:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) 22:30:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:53 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) 22:30:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x8, &(0x7f0000000740)=[{&(0x7f0000000200), 0x0, 0x40000}, {&(0x7f0000000240)="0fa48f0c6e4dafd96d815e0486d89ece261586b7155f9e803c0f9dec6a4c1fa6764e41705a19968c4718fcef301136b3714ac0dd96243d9ff2dd13d371b9d9c892582ce71e040e5e36dc36233a768943178ea658630819fd6908d67c5549125dd7606a647fffd599deebfa29fd3c6ee85fa4812b313ee67f5caae8ad85f845b47a8e0890ca3660d87a19fbf7492a43f103977e58", 0x94, 0xd0fe}, {&(0x7f0000000300)="f12586cf45f03205ccb33c96651f1c24581cceb16548abd7bda12635bcf1d8fcb5d8fa1007d3e32a7cfaf36676a77d10c2276f35410c46149fdeb1e46bac19e9c75979de458183878e1e49950b5c688b6a628585d9103b370ffbc2c05342d2e2634c428840ef493472bee83604d7dca973c2bb11573bbd8ca0e0d89d143b65ab97de5e6b5a1563400a3cd3356e48a3376051d48ad3a8098208cfcc101ddeb72cd123b36f3f6e602220fd6a0c5f7908", 0xaf, 0xbe74}, {&(0x7f00000003c0)="71323d9f4584d38be2b0bf1a4b134a9c7d1267a31aa073dc7f3d18170aa470626ebf0c6b0a309cdbebcd91800ad11d6be2adf23bcf5e3fa80656ea543511f28589c6fa61ecf76391a30f6fc2f1b966e00e6cb934e63c4b6c986837103d2eb6e856041d812e33f940ca4938707f8b301364828242db615a6ff89a2420b07d35a3596bb70d3d3d74dc8a8fa115328289855ef92f7b5df72a0aa5bd98f6361549259816921850c18c901b823dc8b89e6189aa5d3c3a365748f919d403bd186bc87ad127b400a2fbae2ff431595143dc83b13ea6179896247186", 0xd8, 0x6}, {&(0x7f00000004c0)="5d10b7b2562ae536296f53a65975f7333501e2a86543d5d3751e98478a6ffc32c58d777aad28e271dce608001a38fbe22a5e28489d3dc5c1e329cf1b0bd86e6d2a4dbe16ba224b5530a9a7237aeebf3e4a5ad3647698c9cbf64a2d94", 0x5c, 0x9}, {&(0x7f0000000680)="28802be22903a153ea434015030ad54e91c64a724d6a4851350bd8c49a75f7bd8a61d1038916c6e2ae87485a136fd057054a0f5ccbac86b765f7ff51e62f7087d36c208ad3ac769741708060b303b7d0fa39adc02b4f1db1daeaadcafb037279bcfd35af3ca9dd5b4181cae99f753f88be664f1536eb2f3d16c87feed3361dd1dcec3b556a00078ef99eb0b4751c0c78557555aa9848fac64fd515d69394900000", 0xa1, 0x3edac203}, {&(0x7f00000005c0)="e147cf321165221e64363d9f65e3bb3595a95330825d7eea6573261918843eb1f31c141be19548bbaf4863e19084f3f6f654247a47a62216fd5e8891bee1bb1bfb914e57579ca42ced3d43bea6d8dbbac77264ae48d5a41f4f83e47e4c432e5dce4c360fb89bf8bc16ac1677ad568de3cb402a0d5d7acdd6e92e2e9f6d7ad1cf82f742d4faa4b5979521c3be1df35299b369816f8775dfcdf3ff308f1d1feb0ed8b216640abb2db549f0dba51a671ff820de6e934663be9a54d9db", 0xbb, 0xbc}, {&(0x7f0000001d00)="c0f99749a6e7c62cda6ebe39f72b7f02e9b966745bf028307a34b1b99b49272cc8d7430829597695cb12c7e408cb4386ee3496e1aaee3c83d2ecd00e5bfcb044b095d6d5d461e787071167468b612f033f1e06f5784d80c95c67961b003d4a4b2723cce5f92a683d88ead54970e3a18d06c64eb79f561e90de6768dd8f5b2d36242fa10f4a73e5667929b25ae79a2b474b3fe465f25558ffc4631e5449bf223932d2a5880388987d2755b385bcb54ccfa86a10bc176b70d5bd0a544925b479b346810d874827da1639cea24c2d9eefa38e49f1e70f9c2183881f44c27b5b486792a3c4c1d364c484327e00c9dad086d3aed2b604f602dd2c0be77b126ab39b82ba85ccabe8fc06d4cf5e7d55822bb9589882ee8fb44e31a9b0eb370b87e45ea4de521e326f304df92dc3e81f9283b970c96d09a722d306ab0c6c2310126a39b369916cee095b210a1a12cd1ef206bc7df07a1c277f815e4dfa90700ce8e3009ef8b653fdcae7dd0fb294a263407b62f9291ca68b6ef9116e85b90d00840c4fc29a5d14ac8aafe1c02f0daaca1e4c8a96d7b97f079c2fb4dd2a2188e9e08b33fd64870bd59a873ed2a5e808a3728cdee170ef9169e8d7a9f0d7935b8744b76e46cbd3bc7d3766f680be8ab9303e1941c1ab269d0fae0459647ed951939efb0c1d87f3d545bd842cc3ab9b6c56e4247f92c6e40a5803cc37deffbae149da5b6071359998a1740996bd5b34b9ccddf684a65c0a6e1a2c01a935a5a51f5bae7a660d170563ee644e2c1ca3dae8747a70440326e8e3f457761f8e75156f4da7484f53c4d4e2fde070d7dbe4731eb9e48497b71ce6d96fe01719e37e45c112e6a6a77d7788c4c20f45ad38bcb9ca673868e6e9585f2aaeeef2185743634e3dad67a72ad16d25cfe5e48edc814c9e16ccc7923ef7313fbe9ac733b3adff1c06c6cf913a2cae8e536883b7bbee9267134b0f8f731b6a7c83231b519b3a3c0309e1bdd705053dd48b94511532daacdccb6be545750c1a8b5bd456f7d4e82668498b6b4f66f14d35e883936bd38e3133382ec942585c6b58c79a1584f027caefb616065eb1646b6c0de19b4a5f34b33f9eff272a09dc4655af0ce4df53c8b07edf8156aacb276991b7410717e30348f14cfa9e1df55608ec738a86d1b53ce89d63cfc2d8d6a7eaa9b6591cfb520d76df491d2e1bfd257bd9d9ffbd9de3c35f86896c7f07523de892c16ce6ece842fc9b433ea0fe3fff6617791140ee5e24f4c5524c960dc43b779199de3bec451b2c83e1c167d77097da1447a2eb8f9b48a45db080057afccf631f481abcd14ec67a1e0f0d824d82b548d60dd5c6d1b14c5e9f50f64bae882a6e68466b002b032fdca0448443b70121abc94384a5bf9aece7ad61d8baa8e0d221c7150bb51727e292f087961502271f7054d217377196f4171a13c462c6a7df6841f34fd8e82ad92f6d6242f4e8cfa1f6d555e58b8c21f2903a84556d6df6dd98c38d1603659dde81e0bcf8c21756f2c57940bb9a6c96bd54db8f4806bba5e82b4da9f7b64a7d51a93f81884e559ebab143ac8390fbfb0ceec0b9a57e9f5196be1c4de3967bf8187d2c6380f126635cab02bfc2151c918d61574abea4ad164462547cc73d5d92390c683fc3909933ad1e6be910feca625b8a792a2910ba9c457ad8f5b87ac7730e665d413517bd97e3a8d3005f339f5093888d04b6b4ffc40a7a0be55383ff8d6b17c6d7b8dc3507e7551c563983586e677e194eab2c6e886f477aae27128141e78afd7a286af89f1112e062dd3f69c527fe99b75727502ed5adc4bc56cef35f285c2a652353d5e1125cec640ea0732266dd384f1f1af9ed0c76816aa6fabd67cecf5ca5699be3791168f498e40ed74dc346cb6c27482909a327aefcd4276dfac7f08c09588a5e181040f2e7be7ba77147415f5588e700b90a27be2448cdf030ae4c8dbfe0d0877c98ec6d2932c2ea43a9965cadba2abd4eccee6344c6daf91fd97eae51e8db9a031e31d5df0299f39a7ad67037029b67411e56d5c4050c51d7d83ad49759450de0171e53d8b2555e8bd394f0cac13c69fa7f75693fe74c1be14c2fcccba4b5f3ff2b21f31c2642e12381306a126ec5a1707e78effb9225c9739bea5fdab5839d0663848e1d99b6adcae5443b7d80a367c703315afa1eae8e303f450da63aa4a90676abbb9a83278040bec7ac21b0d2db004f7aa3586539a4a3ff0621bd93d71c1b99d5b9050f6695a94f7c303460127bb69ad87eff4dfc35bae0b3ce6182296f4879f8fac53445bd6211e204516b1e323e81523441c0a6a580a0b5a3a24970b6a1b0e07ca3afd5efe2c0e9d1e22c4dc664145b7a842c975fc8c589525570d281af14452e1edf3270b674b50ef658a480832e6cdacd954d174543b958f986583a21f26103595501085ec698f47915f896a49e346b376e2e4e760800f870bce79fc6a682342c5503dda943a4798a7052cb38617f9ebb5a84d51a30ea702da308f94e8fea6100fa5c8824fe151589ea701fe2803b794798612abc31438670953d3a4a70d631ba2dbeff21b8cd4ac45b3a69b48081900f1d82b5eb57849f65fee6dac3556cd1dcdcbda80b221854cce9015f8c621383e01891a77c334cf6599f58b18dc87a3a5b3fb7c15cb9796a2589d25744f63eb5509428a4e6be3c4828a54100449a6db742e234c90c5ed905c3bc435ec317314a239d6c3cbeb11c8f3a7e10c7d7cc09f35e9204e5230f90f67a9d99db25d7c24202454d2d38a701be6681b7bd91c4215499493dbe5f86a20ee0e087124449b1854c264531b6ab5358d5499c742f910c5d9ef95872f80d64aeb29b79366bb409c7fb074f22b727f1f562660a55ea69375ea0554d1e4ff1a02273c90a4917a565af670c4b33615fd2ac6ecef8503700d4142c9df6ecfe51210d47acff38bac0d9161806499f4b518498ef794e3994d6749db752ffa6371cc2970d2b9f56583b44676302a53043f682f3094f8607c310f1311d97c55b8dc16fca77fc061fb4be2275580acde701a2c720a5c932d9ceefb2d83878156863ae6b5ef9fa804150be3dc61c7c86d8c8127f96989ad95ef799d137598a32168b3ae250ef4df9c662af4b09415bc8bfc5d6def278a40de2551dd188764703af3f1aab522a85b3f53ee4f8631440efbe5f142a4458519728c224c65435211628f2a07c3684231001898a0b9189365821388160ba1f841c284ab1e228a62d7706976c36e74e06e78e84564405f4ee6c926109499aa8cb032c3b78a8be056815a9faf9534cc267659cef6b6c0b825aeb6df5ff4991c92f4cc5df3df5066c1be4f2e2efca0e094144879b14742ff73b2719d6218def3a1524eee6439c4461c08aca2e590c0bde796f6888ff8938c97fc2828cd048df60b537518f8befdca31609ef9fceed8b7bdf33e7594f80c1f6bb2d01c0e74dd15cdfd44497bc9019a2d92492fae1674c7f99fa65c10b1cb24feb32af49d8313bef47fe868edceaa748f81c25783e41037b4bfc52d893d2211c9fece96e7b62d3f76b86f78fac9b3a454809fb1c381aed019baf5a40f46feaf2a25dd5da0e2fb7b495eae8ce927e6a248e1b7b31c978da57b96041ff0cf3e56ef35bafad982b9c6805c37852a6aadd4e32accb190418297a2fdd4875ecfef4e54a9acb544d5128965fdc942efcc90a04dbcde47a5aadfc2c4365b87ae804f00dbb3e9b1ad3e52c7414972ef1d2721584455a760a774300b8445f3c934cf20451adf4eb2901057ad9d6caa7695c13b5d5c06cc1d3addd908c60edf21269a208e3ecb655402367dc04ca18c7bdcdec3813f562651d827e5bfdfc352d7fdc24f41c470968897cd4719c06a1bd75b33c3a491546bf71b8a3a838f667b345b15242b115df1dc83f5fe6cdae24ca418b6c0b9a31074f97d9d95bce78add6b6cd72b7b7cc20d20e9bcfb288dbfaa7f3122bc97425b8e90fbc5f1e04ae5b4d98199bc0c5ec4de1520fbbf07f649bb55fd1946a2d71a29aca59eb56221bfb025d4a09be1d3df00ce04348707a11589f6d3c413315fc738c6bd084d64ca760651f398d52415dfc0565da14cc81496cb0695d11ab1e85c1d50851bb33325ba21c8536d86703f1d7bc805311eccbbc719ab43c0bf76d6756eee57d4ec8e23f73ba12d5689610c12d61c01d3fa7c0d826cc3007700e24c7df99440a32701e4851b3db31fde4743a0e3887aa72b97121ea1c701c2085b4a71238c19587b2ea0b6e29bcffeb06ba0c97d28fba98035d7047f73f358ef559bb057fecb5cbdac500957d19c24c62c7c832c837e5ab363aa3bc449346e71491dc5f1bb375e74e4b8340bcb210c47bb4a6d502c140f84e660235ea2a82c0e4b9e212c5209412373c7bb6744832f2b0091a5b10162c2de2c1a9138baef8844f0727390c45fa314a0c2a6c9993dc2634d573d14d9b9b88396c368f2ff89ea3b2e15dd92ecedeb56b85e18b6cbc5c427f9e79356f6e34ed2339f6d4f4c22f132699b0bdf1c0987d8c1ca904e787b230f0420732ab3c37a6e527bed3a1b6dbe06d71dda5a7bb6d196beb2690a0b535f77ec96263fa6d2a36a685b57743864e468229ceb119afcaab2bfdd05e7e6863207232a8933b39c7106189b5b2d886d0b4c1c626cd6b806d4a24634b635a61e13d71e20f1045a25391cfa4dec8534b06fb6057292d504bb540a83270d03c20b73b035c9a44e99787e68454ed41b66fef4b0e90fa6646bb64e93145ceb67a9c7cc472fa9800da057f7bdfe66045f8ffb53d8de2116af2eaf088fb5b6f7fca5821b03c1b28f947a814acba2507d25facbfa59b598e5ce00afaba8ce7c7832749945e699e2e3e2c3d89ce34d02096eb3d50c770f14113ffc8598a103f35f9323ecbee316489bd9d340909f89e74487123c9e646edb6949e7cc10ef28c8824f3db442e22ca6ee20b82cf399ab557d6f9fdc6e015038a386c4b285e690227d1fc795eb54a73018a316dc1b776e76f6b12ba745b8ed9899778b88890f2a0fd70c5aeef66c482f4888d88bf150afd89189361d2ef6139c2a85450d5c4af18f691a38448eb6f9b6662b4fbbe6fb1ca1d8d4158413defab6ed3067e1e3ad18fc316feb55af6051a28cdf500536847a18dc6f5b02a711e2dff18ec8fd05941df7cde5fbb4c18045515daa1d79526c29f18b41211403541187b43acbd9063f83d66c38570703a59412e901d210348208f1cb2ada90a79174bb1f45ec04fc10baf8795df1d3001d18a4c522a2cf53c4cb953c1a82ac31bf6599e960298655415230a0edc4d49fdbcbabe042f3a04fa7a291cb71d917ef60f7fa49cb0e9373bbf7c41c3925640467f8f38faa7a0394c9760d71c942b8d854efa30f24bcaeb4dd320ec56f2c5ea649e960c34d3b05e6db7b1749f26a18e5cd8a2289b44faa22b00308d2acdc85850b8c49cbc157f867b49658f3917f2cbca143d4d80117fa6e96c81289bf6a579b46f973eaa0cce8f80c487429c9dce6a1cbc2ce7934d634b78cb9204e728d6ed9c532d3e44bb4021a0fd1fa7cf2a65b6ad702e82652557173d59337054d4ca4c4392dc5d64db34a414b8e67e1d3374bb7ecb54a8754b820b348eef45974e2a6e7c73b04c8bf9dd3c2fa76bf48094955abde4e2f43f3c1ab4f198bb391d19c9dbff371f52e63f174520791df56aba9cf3e5574a169f0f2af490e142ad4300b2efe8953ebdd0da3ab86c0ce0122c01e31eb037c0a338c2002b4a8bcd5a095b601abeead8b7ce2754d3e4eb48695d79bcac3151542aabb094bf51f93fd5677a6b", 0x1000, 0x53}], 0x80020, &(0x7f0000000840)={[{@uni_xlateno}, {@uni_xlate}, {@numtail}, {@shortname_win95}, {@utf8}], [{@fowner_lt={'fowner<', 0xee00}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fowner_gt}, {@appraise}, {@euid_gt={'euid>', r0}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r2, r3, 0x100) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000540)="2686da34c11273151ffef45bed0a2b073446321b912afbc31b9375f24932e5ef3a8412cd64b83d7703df8e02341e7b1018886fb9678da8e907f65646abc3b968eb10595ae5b48e397a16f7f3f8", 0x4d, 0xbe9e}, {&(0x7f0000000940)="b9211c99dd68db28fd8d3da4a9428a7551568eccb83ffbf60f6e091349d920093dbd32df0040ce9e9e9b2d0268c102163495611ea9d9e90cd1c74cf86fbe377986027f7860a14b7e1472d2ec121b0c4e36482cc93e1e3d66639657a2b607cd334a2f12b65626cb77d32dabbc33737a34fde6189a4b3daa27ed81866f01c217b6e4da02de123515efbae9b683793c6a339db7f275b9f28e1d8e955fe2ed2f0f9aaa010444167b9d91f975173e3447e43324dcfe14ef96a9a1a1cefb26b7cc470104659643855b879eb780d22cf9cd59a22f10140a87a4efc9d12fc34ee818aad6333dfda8cb0f1eb22f6a6faed1acad2206fd60", 0xf3, 0x9}], 0xf0b949b2d38f419f, &(0x7f0000000ac0)={[{@uid={'uid', 0x3d, r1}}, {@mpol={'mpol', 0x3d, {'default', '', @void}}}, {@huge_always}, {@gid={'gid', 0x3d, r3}}, {@nr_blocks={'nr_blocks', 0x3d, [0x78, 0x25, 0x30, 0x6d, 0x0, 0x39, 0x37, 0x65, 0x38, 0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x36, 0x34]}}, {@huge_advise}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'appraise'}}, {@euid_eq={'euid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x14}}, {@obj_type={'obj_type', 0x3d, 'euid>'}}]}) 22:30:53 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000180)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000002100)=""/4083, 0xff3, 0x20000000000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/215, 0xd7}], 0x1, 0x0, 0x0) 22:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000180)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000002100)=""/4083, 0xff3, 0x20000000000000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/215, 0xd7}], 0x1, 0x0, 0x0) 22:30:53 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f00000013c0)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000001280)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/62, 0x3e}, {&(0x7f0000001240)=""/29, 0x1d}], 0x3, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}, 0x40) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x400000008000, 0x0, 0x0, 0x20d020, &(0x7f0000001400)={[{@huge_advise}, {@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0x25, 0x33]}}, {@uid={'uid', 0x3d, r1}}]}) 22:30:53 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) 22:30:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1890}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_open_dev$vcsn(&(0x7f0000000000), 0x3, 0x620d42) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x1000, 0x7fff, 0x2}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000000100001b21b652006c65300087fe1b3fdffcf5a2f967fe1e7f01800000"]) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000400)={{r5}, "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"}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r1, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="141a000000090000000000000700004af027983a00c4048f01000000001c000000000000000000000008000000", @ANYRES32=r6], 0x38}}], 0x1, 0x0) fremovexattr(r4, &(0x7f00000000c0)=@known='trusted.syz\x00') 22:30:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xa, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:30:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)=ANY=[@ANYBLOB="006bcee1eb20983e"]) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) 22:31:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:07 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xb, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:31:07 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) 22:31:07 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) syz_io_uring_setup(0x4dfd, &(0x7f0000000180)={0x0, 0x1db5, 0x20, 0x0, 0x338}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)=0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x200}}, './file0\x00'}) syz_io_uring_submit(0x0, r1, &(0x7f0000000400)=@IORING_OP_STATX={0x15, 0x0, 0x0, r2, &(0x7f00000002c0), &(0x7f00000003c0)='./file0\x00', 0x2, 0x800, 0x1}, 0x8) 22:31:07 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000a40)={'sit0\x00', &(0x7f00000009c0)={'syztnl0\x00', 0x0, 0x29, 0x4, 0x20, 0xfa9, 0x42, @private1, @loopback, 0x20, 0x7, 0xfff, 0x8}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x2c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000055c0)={'syztnl1\x00', &(0x7f0000005540)={'ip6tnl0\x00', r0, 0x4, 0x4, 0x20, 0xfffffffb, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, 0x259194dcebc4adce, 0x84d6, 0x1000, 0xc5}}) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000067c0)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000001100)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x4, [@remote]}]}}}], 0x18}}, {{&(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000200)="30f35b9f0b05819fe0bdc00dba3a7c998bacc44539dc12bf6cd87937fadf7131a4c0f8ac6fa35cd1ba73e222da40044b3c18c989fcd3c2832bc1a1294761cd1563d66943b4", 0x45}, {&(0x7f0000000280)="f0e6e1a62d0dbcb0cb7d48d807d3ae66877bbcb7325cd46080977dc949f399452580d2a1475d167c451c205402a2a52719385cb5b75478a1ed6b560272f846f984ee58b490742a8feaba6ca95195a702dfd7caeb", 0x54}, {&(0x7f00000003c0)="0f48c05e5e90870009f469bf0ccbfb217696a897829532830f6d12dbcaaa9521e87d7ca93085911a7d1c110b0989ff43768ba41553ea3e1e840b4e83be9430b062c83443d63ee38ae0dce030e87e9161df16f95d75e9c1ad75e37d4cd8555c9c6bb27552c68eeabb8842496ff4823f39ca4c18b1c204e716b7e33f08ce9d691e5dc2de124c152890fb9a0b6136c439cbc961806bd3ba25d822a80fdb503696111e7b78a41d1c6988742c811ce123775324b01aa3f9228edfca600ba344bd4e6c42bb80d8f5df8f2eb92926b1deef7000e4355993eac1aad2d4778d7e3850cae2ea609c79e96ecc220f40b82548c21891c6c0", 0xf2}, {&(0x7f0000000580)="dc36c8c35787d55468edddc780bcf920beef45256bd5b749dae4f3a2a9df61b6f65140f47919b2e82b551aafcd4216b343baa23717886e635f36990ab2d1430c10e6b21c954df96d4660c32734210030e9ee5b9a6d6bbed6cc42efb95f32518c0d66a93e890ca3b2b9c7bbb33e3707c095e6a3c10d5718f743fdb90670c2159431d5eff489813736d277dcedc6013dbc4353a2204aa25d8e4b02762305dd9c6581a8fc5f44e0ad5eec2b95c01854dd558b8320f358d9b333770949aeca2ff4fdc94907d164796cc61eccbd84180bb9aeffa4", 0xd2}], 0x4}}, {{&(0x7f00000004c0)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000940)=[{&(0x7f0000000500)}, {&(0x7f0000000680)="8e1e7b", 0x3}, {&(0x7f00000006c0)="af587854161e03292675bc304f4ed1e2e26ca98f2ef59c29f00e51618ab8a9382e0362249ea945c89401f46d55cda1288ce9a5ae44743927a9aba98f9765744bbafa4641d25fcbee961855e9e2bc70733e26b8d8d8877508d4b6", 0x5a}, {&(0x7f0000000740)="370aed018ae171efade1a1cb52c591f13a713756b4fdbf52387abd90e2140e709da849196faddb3d515cd6b99cf219f510d3e922c28d64e537821af39b264c530c05958ac03515ed6891dc5428fa62d8ae6ece60f2bffb653e5748b3da490b89d84075c92bf04e0aacba76cac71639f90471a5b2088f1475fb241df583e785d24a1ad36eee055797099cc9cdbd96155b11ff90eeb7c79c97abd601ccdb3a63ece9a6f2d922e5882b02251101c0286640249c24aae6ee8a739197a74742df45a57ccfedc405e4fdb4de103f23129c312cebc44d7dec52cf6759291dbe749122", 0xdf}, {&(0x7f0000000840)="52077b59a6937acdcd116a557c640ff2f3840ac5282c32fc44d705e578f9227595bb003e499e9833cfdbb0eccc1936bfe0426a78be38706adbc189410ab75d0f29803199f161fc17db7386335402e9b65b3144c5c88a0b94728afc5795510d99414d82f9266e9809c6270382d868e859ff02d020f83c2189920c3e1655fc45192ca52d35afb5c471a8d5c141f24a13e5e32783f3ac0249e3c2365faeb9fa075b899cf605491ae6bd3ab12658d7795bcb520a4065e2455e0ada8611113835a6b35c1f39b93ebf9c8873674e8336c231ca5451c64e7a49445703668d44495999fe4f5721f037393dc08ca5108ce61609f63cb3e2d2", 0xf4}, {&(0x7f0000001140)="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", 0x1000}], 0x6, &(0x7f0000000a80)=[@ip_retopts={{0x134, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x24, 0xd7, 0x3, 0x2, [{@remote, 0xc8792f2d}, {@multicast1, 0xdb02}, {@multicast2, 0x100}, {@local, 0x401}]}, @timestamp_prespec={0x44, 0x4c, 0x1a, 0x3, 0x6, [{@dev={0xac, 0x14, 0x14, 0x24}, 0xfffffff8}, {@local, 0x8}, {@local, 0x1000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1f}, {@multicast1}, {@dev={0xac, 0x14, 0x14, 0xf}, 0xfffffffc}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@rand_addr=0x64010100, 0x1ee}]}, @timestamp_addr={0x44, 0x54, 0xfd, 0x1, 0x8, [{@loopback, 0x7ff}, {@dev={0xac, 0x14, 0x14, 0xd}, 0x20}, {@private=0xa010101}, {@private=0xa010101, 0x9}, {@multicast1, 0x80}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@multicast2, 0x2}, {@dev={0xac, 0x14, 0x14, 0x3b}}, {@remote, 0x7}, {@multicast1}]}, @rr={0x7, 0xf, 0x72, [@broadcast, @local, @multicast1]}, @cipso={0x86, 0x6, 0x2}, @timestamp_addr={0x44, 0x34, 0x97, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@private=0xa010102, 0x8001}, {@private=0xa010102, 0x1bc7efd1}, {@empty, 0x101}, {@local, 0xb9}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x9}]}, @rr={0x7, 0x13, 0x5a, [@rand_addr=0x64010102, @multicast1, @multicast1, @local]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xff}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r0, @loopback, @rand_addr=0x64010102}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}], 0x1a0}}, {{&(0x7f0000000c40)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000001080)=[{&(0x7f0000000c80)="78212e78a91347b018f924a36b10cf9ca16d4f97c665bb8a217c884ad47d1f2d55eac46238c4d24694194610b172c35cb76eaeaff0d0cf8b059dd1c88a7eb4629a68c29bb1fa9ac708a872", 0x4b}, {&(0x7f0000000d00)="41c1512428c26beee2d3d11eac36e270adef1bf2c257b9062a9c802462513d02c2b1c73806b13c939d1961605ad4b5f3aa5f0ed4b7d9b35f0dd99faa40e2b7788c81a9228877e4c56217fcf1b5bbf2b6a9c12efd1f72cb2ef3f9724b5520865ecd26cee3bada23b35e965b33b66919b9bc72a6b00bd9d98a4ec6a1277e87fe417a15211a8e27e960e2c56b05e4bd3e87e0c607f2fa342a4dd6412affab3c8ec7f8f0f5b51335b72f5e9917fa997995aa6a7e5fa5152040075a7abf8a944d6469827c5dbaaf7f00acdf42491678aaf340", 0xd0}, {&(0x7f0000000e00)="1b1ae7add442a9551b77b492d555945d4c15adca61eb621be40962894702cdc0de96f0cbf45da40211d3e4ff6df7850a881e974df9f7f1614f072fd42ead465fc184dff994838e8d0f08c8451943ddaae8dab3702254db9cfcce71a375b00d", 0x5f}, {&(0x7f0000000e80)="3df35b76faa831c804804d0cf64df8524809c6dd7bda5fb5ec3f8b4d5468c92b7f9ee35bb5", 0x25}, {&(0x7f0000000ec0)="84e3c37396254723d9603bd7f71e3d95d07420f3ea6b7f7558bc5fa2ff78a9269b789cff2ddb00e74fae21fac0a0a1c8e4e1baaf3134ff31945738d93218b95eb456792ebfc8e9566138bbedd2bc3eb91a2376a5b239b67af4d848eebddaacbbba7592539623d96751349e182496e63aa27112678cc1534de84d009a4316e1328136a50737a0731ce4d75d428abc30d89339496d649ed1fd5e5b87319b872080595e061a84f878848fc273164c1bb89d296be6b970a73901c8aa94a90feb85f27240a3cb4fb4ae594b45b51ea40b155add45654798c76e4a13784369e8", 0xdd}, {&(0x7f0000002140)="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", 0x1000}, {&(0x7f0000000fc0)="40451c47b6be69bb42c6ad59eb03955b937dc042549459bc8124563af924c32cdfd6a23e0a0c5ef3b8f6b39948ddd071ee9d55533eac64bb2ffc89d85281ac383bd1d3f94ab0894396acdf77d0787e0c84dc48d63a6375a9636fe6dd407ef7b51116d3f3ea0a39cdcb6b9e73b5bf4dfefe8b910cc6d93fa16bc087fd1d7c38a5f541db77c3228af8c18f21860c1d6c693ab809ff69f367e888d9ca5f9ebc3a8a228e", 0xa2}], 0x7}}, {{&(0x7f0000003140)={0x2, 0x4e24, @remote}, 0x10, &(0x7f00000054c0)=[{&(0x7f0000003180)="77450ff044527bdcb37f85a409fdd4d85576a3a29133e00b761c44091a9bc5bf1a3da978afab0a4ac0e1a504646f6a183527e1f63b8031acc5bbfbb0d66e4f49be75ea027eb500c2d0198d790af008acf799c62a6a85f5681c352e89c81f3bf11c36e4ffa33993722a00b939d9", 0x6d}, {&(0x7f0000003200)="3a95b530b5ec4e6014091320f462fc69eff784133fa6e82269595017ee62150a40c67372a06a6209e283dc65adbc1b115fc816769d14094f52f754f7bca60b5114a91a12b7038f3806d71646cd7e2d7f2bcbb848dc5c1c20ec5ec877f5bc16132d9e822f17c86275038b9b017feb848fc7fae1fef09973be03b4b76cdcc1dff64c76dbc0a3364adb356b3c2e1ed29e8d0736bba3d1bd6d8e1e1cc8eef91303aa77c1d85992adcb9ca5dbf4feabfeb7bb1cb4aab62412dd4523584678f05d94aa360ac9ce30717fb2c12b5b9f5f903bff0589721d9e0b46f5223f14d0c2dda1d77540", 0xe2}, {&(0x7f0000003300)="8856f273b3f47e0d66816fd2a09df69cb8bed4a05ebe6df7e391df15f962b69b8c751138de5fe0366fad776f53dd162b2bb471c8b1ee609ca1898b0b3175b1f583fe2bf659d24bbf78337d1199b34b8ae611c19147a97ea5f3d862c81e32d1b963c1623a568daf8a3a674ea6a803d694db5aca312b9a4325a4216b8a3829ab01d20fb568c92e3a6593126a51da033e5f13513ac78438d43d51be7ed9788424949c78eb8e7c33c3f0b90ab630b0ec8423121c281bb362f13f35a59178116f886f3d5ce144dd69c6ec85a4107151007ac45335c9ba221399f4ecda2f7f3f3ea378b334635141c5afb3a86693132971b257093cdf517d66e6c1ee401aa6e3b52bd0c33873343b10fa2e324a181c8531cc862f640a71f958fe7ce13fd7e675422e2a7cc434f0e568d809bca3ab1dbe711162a5d736f3dde3c34fa088e29f504a19965dd8792cc362c5cfebea4701f634f366f646cf4584d3dc3bc7242b17d7c41ed07f4e2ef6bfd1719ee1e5f598ac1ed60a4cd6ec63f48f66f6331ca2e35cd9b9c3e33b6ed4444c8fa5220e10620f4b6952e9f5780eb9e01d9c7a9d5230c54ca3a8c11d34bea3eae69058631e46efee21399debcbe2e373f06afc0b1e604ac3a388b34b23ff32fa30706cb5d15d305a4ce48b5d483f0d545f830398d1aff380184327c8385455249385787ca22a603d2e3cec71371809aea171939eb30aefe914e8a2e4714a8eac85b85f7b4850618787e93e525690fd2a0a0d32ddc2daf5dfc37952cc0ae566f803fd339d5b8c902c664107c1e88c365e58359d67d9b5e78da283e15898614f7d43538b9f8d6b116ee825dd52fbb9409424a270c26088882be77cbde8ba833a02e042bd37f7cbb4cd61d68e54ee8cb42dc8552fc0faeefb62b962805d0ecbc2d4c6d6a3ab8bf6c17205e577540420c3a5e8302ead1a42d8c041ed5115ebd2e004a096d0f8aeece410d789b982ae7c672290d969ba2b3c79c1a885fb0026217092fe2ad24ab1c76321577fe27e7c4f9a7520d591d73f0987dc5b1ff441c6126e47b9f2956deaabb232df2c94628fbd8c2961e543f6561aae85d1cbb5d700b34ccc9f5b7b4acf63f6730d2705ca0025ad80ebba5df1f35ac0eaf6c4451f9633f9c3178fb2424e13db70a317ae1b862cf9ffecf0d7621c9acb33a519756b132952e611009b317a022799e4acbfc1a916c8353e3294a54671213d3eac5d508737ca3bc256ed89dfe6b954b216e0c75ab3db397fc282951e6d0ee3f8dd9bc344d4f58d3785f9dadeb9600dc55e3ab651ecae8624675e864adc40da0862bdf080c8828874d31b76ae1076cb263734205a6fa5bd4067bbfc0f85b002e057d8e8796e4dd9c071be5e53d75a4fcbf45be7631bb1d7893147742e0da01de43bbb5052c19b2a1b42e3a2394f55f02f45156c4f7ff38ce4348fe79eb0f856dba149c92033a772bab948623d4609cfbf6eb781bae3273c379b669aaa1a269afbc07329ca321fdef0576f2f4e24b40ccf82218e5fa38759461a2883f14294f3b3cbdfe770dc518c84656c798d7dd7fa70918bad841cd8f357a59f4e3b6aec3b828791310c38c34ded9eaddcf5a8f8a8267cfeb3e08561d449f534af63d5c57dcd04e2eaacc0abde36b25fde21ae9a7424ff9f83507b324dc2d4ecd390c5460290a6b6d317a069f1daaf07ecf15b4a2900e5b5b9aac15ca62ae4967cff373c5e48e420eea3957286fffe9fb2c8c45312d96fabc6742e9c152fef31b94c4e3a13b24c526ab226f078ad2cdcd36aef7fa5025c90bf701566835b49effde5110f96dd805b003f30849322b52c3ed482c0cfdf9523f7458855374c2374739fb607b155ba6edea22a76256709e618610e3c7d1ade3fef7864a83fb3822faf38d6010f2cc3c3e8a0cdeb414bdc87132fa4757420482d6fa4fd06b271c85cc3933b02a9c525698c60d0e9774fd2ef6fb232ddf96387519156b9b8ae074b90a136b692ef6c6c9c94e7da487864fb3782c33e4569947c206917a5c097ce0e157b79ede2408e9a6bb3ada261444e5e0567d6b75f2bae506760eadfd5a8246e544d5e129989d55d363df074fc1ffd176e7662b88cee7528ab7aa17fcef1488293bd20d6a74bef7533f09b6abbd39b29ca1072ad5bff72ec02a45661ac14df0cb226afabca8808bf4d1087f39ddb5776c09e0e5bdd36ce11a1b570e4edc5fbddb23cc38585a126b87d9d66936215a80b82c84af905d3a6b0a2d2f95402ff57af7d1425012b20b9d52f91b1138ec382972569fe8dc63055412f1368935ad075dbc426c328fa501569124da24c70c06cb92b99099c0bc1177da62470870d2012b66c9a89d8cdd9bad6b01bc47698a906777adfc6eac361728efbfb386f338f938c7f29c55732f93474639046683245fd3b88a2f851e752d11a47efcf8596b9eaeead41d1c2f3e1b23f817398ad2dc346d14a4af557bac005d41116c25248451431c7d24c273659f35813573b4d5d05a4a760b56cba4bcc4b8ff8836bcdb87ea787fc5bd6b9afeca629bf1a44bf5386c4e6f9a482fad4ca6dbe78f7d1e499c8c0eef2bfd64aba251aee00454be36aedc39a907b0017975f11d27ff2cb02a99105dac4ce16850db81ff91a54f8e9ccaf2c3382e703a5a72d7d4995a0a61797ea0d72950a7b0e24a4b1b0426e44ec277c86a21998a884f7dae5396157d6f783bce3e12dca50104e607c865c494ee6ad7429f8cecea8c556e7b7f9c628806db64c2b3526b3b5c7faef2435769cc923b17f6b1b9faece3acc524161e3088d4c1ba30e59fe1cdefbfaad783ba6a8c0b8fce68bd95d5f74afbc576904d1d72d505b340ed77380008747272ca169f9f10bcaac404cb48a109190cbd613c12afdfbe52c13ba23d9a34efada66b742a526cd1207ddadefd21236e45e3c0d89a9fa1a6777f5193357b71c83aa27a3fb696bce0496df2e64557862392f4ec569a1c419d4b36f5758b052a76386d444c21a5c87d544bad0ea367c728480a4219d71b6a4feabbcdf5a3292cd2dafedca5a1d9344f2ee61ce11a4655844f2b55366b25332b2225938dedd1d2d251e9262d6c7eb380d2cc765a977c456e3f4101e58559e50e60424a60cf4d0d3e60fbde68b783c0f3038e3509e24417bf84f315449de3023f4275a304162d7c88ae2bb53af8554fd0c885d39f207b8e9bd122b1f5f1730cdd90e9cf873e7384188762e191f954ec5fa61ab89b6396bc3e9b9b5289ca168249b5e39bf7679e2438bc43f3aa407933041e2679b5d1c2a8aa1ccf4aea6112abd86fcf58aefc0940617979ebe81225627ddae493f6329af72dc887e39babebbb41319c8a700b07cafbc2c87611da4ef221f795bd00dc46a9d74ae16ccc82de714067dccb72bc1f02b5f2aa9633be130092bc292b583dd2c67989a6d66c12c012c0cb3dc548ee7ee207e5fe1b598b195be1f75bdeab4def5b48d37f01154a2c994ca13078c34c0fdd10e03ed2b73503f6a001338a68e1099770063595287328fd3f93eaa795b1933651faaff73c38dcb579f7ac974c8e9e6cea3701b1dab867dd8baf0698a034318074939988769aefddd4202076bc71cad8e294070f4429f0204122597d23c6c0165b30eef2cc466c519a30779d86e44b3ae96cd2622423154afd34f3b65b83b17253719089b5667ca27a312d553ea636f505d819b6f95af73b25beb86bcc064b1f699092ae832abca866054657c3111420d7a923f498c1ba0d44e32337ea9b0126578da655872effbf91be32abb893ef7d48a9b38320d36fb988020dbc50d3bf9b011c03e69cf2cfa06c3ece141a90749274fcd254a575dcb6a728fcd159a0686583b617bb22bb02a9fd985e3f2c2b1338152b2248a9c29f53d16bdf292d821dec627ee2db36f1a7682c25a0cbb1dc1727857d5fd652617bf7d79f9b3a852e5170ced36d2f2e497be8b0582561302c899fcfb5a58f0dc07ffe4e266a9145f97ef939ee627fb6c7eae333df67636f77de7fab5e463380bf489b941fe37ba3b450d3e915220d6a8972f603731892e6d7124d537623967b28735a335400a493b22a5f8c78b9abb05e4756d1407753cf62c289aaf4e31c7899bd066e49913dcf61454ced1bacde351204be2b7b5ce909ad43ab3326d890c6a9dac81f5116d1a7c1d440f6c295aba54635dd947ca5f3feebdadd63890f9f8288ae00d1f8c93e1f225b70654d72f43ef477feae3cd60dad905a4fa06512d44e013c5301ca53c0fb3b2dc92acfb16606ccd322000a8737670058876609554efdf714783369fae9ba30be1f1d7388b9617bcd5dff337e36787479aa443de472795ae2b899e0c0e8bd3009aa7ffe985cb411c7100f81a0d3824f80ef0f7f739ae2dfc52a872e76fd24f2ae207a4b55826c5d64b28340a73ffa32214b0aeac6fcc5c2570ea51a1bc8d7185786e0ecfe9a216b06477a63dabd265e8b1cf393780dc5b08e88793abd9b1a8f792dca99e7bf52d4fb5736d5d728220aac3eb9bf8dc1015a5cf1f31f21b86ccb2f972cd3a09df7335c45093cb65587eec6ea2900898ef69c816b9c4ce8620a4a0b346df63782ca4f31041618409c5f3353231999320bc5f901bce1d174c0a8bec6b1cd56caaa033db0de0134761c54dab87672ee52e23966866b340dc6e81b269b59a379fff231cd9770a7017e057a2ec3330bffd83e3f3e226486fc14c7e6e0da0d506bf9173d8bf4d040f82fed13c0682ec59247422f4365a88bdebade65903be36de25aba8c8a47f14027fa38c93c2a23adda21b7e3e8554c522e7b2c6e5bb2f02e7819f53631bb1756ca7b4bf550b8174c867c0c6a9159546de50510a69557c50b56033ed5b0a3c257d0ae1d12e90f247c10cd686eab609f672a417aec82ee8543dbcce85a745060651ba2188f7f18731d506a2bb67a9d9f9909e15a07b23e4352e2bc49ed3de352ac1390b7d4ccd3a6395112a02c77459f4db7560ffd9480304ec667771dcaa72d284eba8e6dec6a09d8a5f79153de05d03f28161dde392baf490889f8387f441ae7da01b5d3e5f3fee2b309827adfde7969704f9d37d59f38707ee40722a73cc0a15cf9b25831208a727330372879df069aa4c92b18419992ee77085e0f027565a3130611debe27a1fcb32148a1a0f28b5b3b11a469874b47a726939323a136448fc064e3a0e7f6072e02fa934018fa450827a3287bfefb2815d4e3202e21b158d60eb88760378457348ee0f60eaaeb2ae0decdc31fb119896fc19329c5d35df3d01e5a3bbd1ddde9700ac882aab182f57a80d47930e705f9600bfa9b96ccb207f373c707a892df21e6dae081fa6bc66c8d59bebb474dfa9e301100757527ce8c6514ef881aa9d339efdc9768d17abcaa3c59f727499d8386dd8933fed4a0130f1cf57dadfc951344bfd2978094b9dad067c04c0c0fdf1a61f51a45d3c1bbe3e491ba0caec09b08b8c1b28aa9f034641e92261d92711ee2fde13d1d3374e957e03b10b12df5c0c80c71416941c4956db97369fb11487a07db1bfca563164921a98cd9409bd33cca47377f54c2d14615bd3094884bd47ae54663272a281f44f94b4d2804b6f8e41db0ca5d27026383ca3d3780ed1e27ac2ae2499f397d7056ac2b52db0796ff49d4b763917977021b2fb0224b4ac897600dfc618a000ec455c8e9cff5ccc9c9e90e428fdc18652ce0212ffcf8847dacf057da87ea09c632ae2e2e3d2b76c1a4466266aefd897f10e5b735b6b69fcc0af92f1705bcb4e1ed31db21b5ee6286a6620090e747b4fa69624fbc190e4f75503ae876276c1c74c", 0x1000}, {&(0x7f0000004300)="6f4087810d8d38543c307ca724b174b31abe7ca0a4340cb478f29399874a7519c5d5ca48b8edb28cb93d8ce71117ab99708512e8f5721700114fb4991b108a04583752fdef73c78fa9e257f2032e4b29b19cc66886172654ac61b76877a0e16c71a2a56e08cf50557b9a35e42a1fe4b93e006432d0882770c37c2ab2604e8f97d503da2bbdc4f4e17a56ad7eb2e72d20766647f711e3a818bddf724ad28486faf70873eeba08d773c0f5c1d5027beaac101632e38c8c501142762fc3686ee48f73eb58ff4a521579", 0xc8}, {&(0x7f0000004400)="018611dc91efd0aee8672bddfd23832275f426ee9874410f24cd9d8e29f21de3f6f93603745a29a67936dac5b70acd1e34bb71b7a332fd005f8182f5ccf4117ee16e084e499d0a2b3bf6ec361b564d37d4f9a19a3b0468b7fd4a4167abb1416821b1331419de65483fe191251f644d7c793112489c68c75ff1b247a662fe3ac8bde5b9be90815df812fae119e6e1", 0x8e}, {&(0x7f00000044c0)="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", 0x1000}], 0x6, &(0x7f0000005600)=[@ip_ttl={{0x14, 0x0, 0x2, 0xc01}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7ff}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @dev={0xac, 0x14, 0x14, 0x31}, @private=0xa010100}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast1, @local}}}], 0x88}}, {{&(0x7f00000056c0)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000006740)=[{&(0x7f0000005700)="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", 0x1000}, {&(0x7f0000006700)="1bb926bcfc3e6ecfce9d", 0xa}], 0x2, &(0x7f0000006780)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}], 0x30}}], 0x6, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r7 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_drop_memb(r7, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @broadcast}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)={0x2c, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x2c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r7, 0x89fa, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'ip6tnl0\x00', r11, 0x2b, 0x83, 0x8, 0x5, 0x14, @mcast1, @mcast2, 0x80, 0x1, 0x20, 0xffffffe1}}) sendmmsg$inet6(r6, &(0x7f0000004d00), 0x2f, 0x0) 22:31:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 22:31:08 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000240)=ANY=[@ANYBLOB="e0b28325f5236bb66c4908ac1234df5722c245ea0c3ab97bd1454d5f223f69af0c00861db09930de97ffad22254f8435ab3867a034028c5de12ad79f1c0eebad9dba356e1ab6548fba2b94b11a7d1934753e2d77ff47b45182a0caf0efb01d9ac9407c7d57d1eb8a89bddb5ae01e8aca30a0f3de2ab540831c66bd2e694e2119b978e14db2eabdb471673386edbd4360e83ca429a1bbb6e5a8c147be74a19f358eb027e1d590e1473e046d141082910965121274daebc0a0e62783a5e5906ffcb5634d06f7b9ce2f4cdc292dde107b2adce3b84418d6fcf35778bfa8ba3ef254b07cad43dd14064b242fd96a945286112f4271"]) 22:31:08 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:08 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:08 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket(0xf, 0x80000, 0x6e54) setsockopt$inet6_mreq(r5, 0x29, 0x14, &(0x7f0000003980)={@mcast2}, 0x14) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x600) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x41, &(0x7f0000000040)=0x10, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0xa63fd6a5717620d2, 0x0, {0x0, r6}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="05e7f51ff72195f9a9696605370000000000e9ff2d2f66696c653000e3625f65c88c94e344711db04bf00b644b52d43fb526eeb67295271b00357803a035d30300000000000000ceaee47ba807571ac05f70a441d24f971c6f41a4f335b40562bc9d41e73dfd52f36fbbf8d3d2274f1f204dc4bd60752ffad6e4169b88b742f13fdf0e05a2b68286bbff18a5dc533e7854b4b011f6c742"]) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r1, 0x0) r9 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000b, 0x810, r1, 0x10000000) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000003940)=@IORING_OP_SENDMSG={0x9, 0x5, 0x0, r4, 0x0, &(0x7f0000003900)={&(0x7f0000000180)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x22}}, 0x80, &(0x7f0000002800)=[{&(0x7f00000003c0)="947a2f8d5841aed39904db6f11e1ee37c5a89593fffdb205de7a4f19b3e97729342b7e21f08cda81dac2b3a19e2ef474f1cbbe174eec8722b76000a67c714f69b1bee1bb61b376f187caf53b5041de5818b464d4c9f38398c7683d491fa0a889525edd779887fe9ae58895855d035ef5dd095e47254da9e673f259f8c764cdc1a2acc3bcb5f3d8a28c1041b9aa6888c26f81af6d17ec911ac1f9f299e82ae67f65f7aac21fb4486f1cf60e4ca7f0", 0xae}, {&(0x7f0000000240)="71c8e111ce55e928fd1f3ad9f2356eb0a5189eb70f62bdd591b7222ed3c4ecd4c06c9178c5904ebb45152497be396eb7a51a80956f23e679441257ee292580996390955b3d9f822d029108136a64c6578d56328a36cd5e10fe6934", 0x5b}, {&(0x7f0000001500)="af1d1a86167097185e707e354b1f5e458aa37c1f73f083771aadf824f3d2594358e3307913ff156c5443918822393cf0b107094956d1c5f655384c37d4200c127bb68018b6961350beeacc6c189f99897a8e547d1b69ccc8ee5b82a0ce7128714438b315fa3492654f313ba2b09fe07f1933cd1906624570f2456f12d420d506e1a73c8831f115f3954ba70a0bf82c7d0ce20b03c429810a59da8054972a7a08be9143c3daaa85cdd16812bfd41527deb4ef9e009b2ebd76265d88b3d1e650143e20c89e146568c7ce9e6fb2fce8e2e8046b7865d251e1d0502b751f51067e834eb7a0b624c3def9f7590bed55daa464", 0xf0}, {&(0x7f0000001600)="06f83a535f64efc7b51c83bc0943b494042a2451850e29e907bd796c638b49607e81b5cdf36e15a0ee0cfa46556a35b5b375ac9fbcca34d1af2c3c87d8ed8c386373ee9ffa79f56807957a2d32a7fa19b6ac62380da886050d19fb96baa7f5e50d71f745e6e9c3c53c7dfa8dd04f2224e87c191cd2a669ab9b54b8e951a66fb6d406870f144012e4dc40df935470e5f1e468f2ea68285345168f456f3eb8a089f7e9e467067b6041e35a4dd6", 0xac}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="1317a97f08cb447e0a9a0b493885bbdd083d85693d7704f1b6168613", 0x1c}, {&(0x7f0000002700)="d73f684bca42c4b55af52bdb2218b28baf1645d925c899f6e397598b98fd7aa93e35e2210739d475b57313220cc43a567b09f5e6721a2688640fae800066f30b22b477a99a9ad30947dc362dbdc6aee0034c6f69c6e234466fb206096884eb", 0x5f}, {&(0x7f0000002780)="cbe54b01d9181a4fcfb8b3fb03858d24c328", 0x12}, {&(0x7f00000027c0)="08db6a6b81a889", 0x7}], 0x9, &(0x7f00000028c0)=[{0x1010, 0x0, 0x0, "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"}], 0x1010}, 0x0, 0xc005, 0x0, {0x0, r10}}, 0x3) r11 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r11, r3, &(0x7f00000002c0)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x6000, @fd_index=0x2, 0x0, 0x4, 0xfffffff7, 0x10, 0x1}, 0x80000001) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r7, r3, &(0x7f0000000100)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x7, 0x0, r4, 0x0, &(0x7f0000000500)="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", 0x1000, 0x40010140, 0x1, {0x0, r6}}, 0x3) 22:31:08 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:31:08 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x9, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:22 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0xa, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:22 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 22:31:22 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:22 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000240)=ANY=[@ANYBLOB="6984e55b5364e5c9406362d855831f23922c43dcbac7bd58a540990f879547dd1f8ea3ae05e94a3699f77bb18e6d1e8a3c5ea3a393c1c03c7889423d23e9add6999838b1a2724318ba2913ee5813bdc4872832b73f45b46b67e33f3f644e90ad3488b28f0987984aaae481471e989e507ef7ed291142d35cad98d9c3cff46e5a860eef48ff030000f40931820f81a9e31b5d1cee0f3613fe74abdd89f45a09c7719c000000b466c9eb78e193232befa9ab23c06a0000000000000000"]) 22:31:22 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x18, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:31:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x40, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:31:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:22 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:22 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:35 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x4c002, 0x0) unlinkat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000280)=ANY=[@ANYBLOB="6e725f626c6f636b733d6d3974352d7074062c01725f626c6f636b733d33782c000064653d30303030303030303030303030b5ea3f8e252fca437460303030303030323030312c687567653d6e657665722c0000000000000000"]) 22:31:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 22:31:35 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0xb, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:35 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x700, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:31:35 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:35 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r1, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 1) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:31:36 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:36 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(r0, &(0x7f0000000380)='./file0\x00', 0x6000, 0x400, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {0x1, 0x3}, [{0x2, 0x3, r1}, {0x2, 0x2, r2}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2, 0xee00}], {0x4, 0x2}, [{0x8, 0x7, 0xee00}, {0x8, 0x6, 0xffffffffffffffff}], {0x10, 0x6}, {0x20, 0x4}}, 0x54, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x11f0020, &(0x7f0000000240)=ANY=[@ANYRES16]) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x44001, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x120) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) open$dir(&(0x7f0000000140)='./file0\x00', 0x400000, 0x85) 22:31:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:36 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x900, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:31:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r1, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2235.057454] FAULT_INJECTION: forcing a failure. [ 2235.057454] name failslab, interval 1, probability 0, space 0, times 0 [ 2235.060326] CPU: 0 PID: 11154 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2235.061849] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2235.063678] Call Trace: [ 2235.064270] dump_stack+0x107/0x167 [ 2235.065077] should_fail.cold+0x5/0xa [ 2235.065910] ? getname_flags.part.0+0x50/0x4f0 [ 2235.066908] should_failslab+0x5/0x20 [ 2235.067748] kmem_cache_alloc+0x5b/0x310 [ 2235.068636] getname_flags.part.0+0x50/0x4f0 [ 2235.069609] getname_flags+0x9a/0xe0 [ 2235.070420] do_mkdirat+0x8f/0x2b0 [ 2235.071198] ? user_path_create+0xf0/0xf0 [ 2235.072135] do_syscall_64+0x33/0x40 [ 2235.072951] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2235.074078] RIP: 0033:0x7f3bf0652c27 [ 2235.074880] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2235.078913] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2235.080583] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf0652c27 [ 2235.082134] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2235.083685] RBP: 00007f3bedbc9040 R08: 0000000000000000 R09: 0000000000020020 [ 2235.085316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2235.087270] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:31:36 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x6) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 22:31:36 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r1, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r1, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x57b9, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000200)="f98b90fff317aad866b55aa882fd57ce28a06826859840cb309b19bc96572ccb6f51739458179be423522c6eedd381bde555d6a6f55e667c363a9a4718e159529f833340ee459a020efb26757dcfd3bad002768e980b6b690601668f79d5285720cae0b6f4d596f15c5392ab42878a1e63e90efe0c77c4e6c71836c1c0ee9d32f834653ffba1bf", 0x87, 0xb4c3}, {&(0x7f00000002c0)="905901afeb4c663e4558bbdb2cd4d28708f843c840c3c3f3ce10a366f73c4810e93a6580eb4a6062b32afc4554585e9d27c65d450e6bbbf51f4ec5cceab027e5d093804cbcf50162c0e75a226e4c8b59dce82d621ec4ac9fa9eba0ea8d0800933e7c354b2b9303865776fd14b3471510223dc791ef4ebadad3b770fd3008560bd222e95d67743566a2e86c0284a177b3dc0c8e6154c84e4a56257bf5f546dc874026e9438cadbc6452d85e75f295812b461e24824bd5b6a970c0495cbbc672876bf8f1e5c27ee2b7f9c0e5543a6b0beefbb9ad", 0xd3, 0x1}], 0x80080, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=win95,uni_xlate=0,context=unconfined_u,context=root,subj_type=&B,fsname=trac%fs\x00,dont_appraise,\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:31:52 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 2) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:31:52 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:31:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x18, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x1fd, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='ocfs2\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="646567636f6e746578743d73797374556d5f752c6f62aaa1ba3a304153b60000726f6c653d0000070000faba9815058c19"]) 22:31:52 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:52 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r3, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) creat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) setsockopt$inet_mreqn(r3, 0x0, 0x17, &(0x7f0000000080)={@remote, @empty}, 0x4d) setsockopt$inet_mreqn(r3, 0x0, 0x17, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x4163, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)={0x6c, 0x0, '\x00', [@padn={0x1, 0x1, [0x0]}]}, 0x10) dup3(r1, r3, 0x80000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0xa, &(0x7f0000000200)={0x6, 0x5000000000000000, 0x0, 0x2}) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x29eb, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 2251.316717] tmpfs: Unknown parameter 'degcontext' [ 2251.324746] FAULT_INJECTION: forcing a failure. [ 2251.324746] name failslab, interval 1, probability 0, space 0, times 0 [ 2251.327399] CPU: 0 PID: 11198 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2251.328924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2251.330697] Call Trace: [ 2251.331262] dump_stack+0x107/0x167 [ 2251.332039] should_fail.cold+0x5/0xa [ 2251.332862] ? create_object.isra.0+0x3a/0xa20 [ 2251.333833] should_failslab+0x5/0x20 [ 2251.334645] kmem_cache_alloc+0x5b/0x310 [ 2251.335510] ? ksys_write+0x21a/0x260 [ 2251.336335] create_object.isra.0+0x3a/0xa20 [ 2251.337272] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2251.338360] kmem_cache_alloc+0x159/0x310 [ 2251.339246] getname_flags.part.0+0x50/0x4f0 [ 2251.340168] getname_flags+0x9a/0xe0 [ 2251.340968] do_mkdirat+0x8f/0x2b0 [ 2251.341727] ? user_path_create+0xf0/0xf0 [ 2251.342620] do_syscall_64+0x33/0x40 [ 2251.343412] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2251.344509] RIP: 0033:0x7f3bf0652c27 [ 2251.345300] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2251.349221] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2251.350842] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf0652c27 [ 2251.352364] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2251.353883] RBP: 00007f3bedbc9040 R08: 0000000000000000 R09: 0000000000020020 [ 2251.355403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2251.356928] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 [ 2251.392806] tmpfs: Unknown parameter 'degcontext' 22:31:52 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:52 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) symlinkat(&(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') 22:31:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r3, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:31:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x700, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001d00210c000000000000000004000200ea74dcfc1215163913ba8da77de0f02a7b0f600aa22899ea7e25c2b6c36a96644d636d178018332990c9f7d23063f066f3481d48afb7d37adb16b8739c4a46bbf0d5a0c74f34b3f8d56c8e4cc104453c83ae93346b07786c7b119da87bd912af976cca14a4ade108855bbea97eff71258a7e814ed5"], 0x14}}, 0x0) 22:32:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x900, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000180)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) setresuid(0xffffffffffffffff, r0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x20880, &(0x7f0000000280)={'trans=unix,', {[{}, {@nodevmap}, {@afid={'afid', 0x3d, 0x8}}, {@cache_loose}, {@cache_none}, {@access_any}], [{@fowner_gt={'fowner>', r0}}, {@obj_user={'obj_user', 0x3d, '%@:-:'}}]}}) 22:32:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r3, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xb00, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:10 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 3) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x2) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x40, 0x20) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000380)=ANY=[@ANYBLOB="6e725f696e6f6465733d312c687567653d616c776179732c6d706f6c3d6c040000002c687567653d616c776179732c6f626a5f757365723d4e293a2525262c66736d616769633d3078303030303030303030303030303030342c00"]) umount2(&(0x7f0000000040)='./file0\x00', 0xb) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240)={'L-', 0x7d7}, 0x16, 0x0) [ 2269.214760] FAULT_INJECTION: forcing a failure. [ 2269.214760] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2269.217337] CPU: 0 PID: 11250 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2269.218756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2269.220453] Call Trace: [ 2269.221002] dump_stack+0x107/0x167 [ 2269.221751] should_fail.cold+0x5/0xa [ 2269.222538] strncpy_from_user+0x34/0x470 [ 2269.223398] getname_flags.part.0+0x95/0x4f0 [ 2269.224310] getname_flags+0x9a/0xe0 [ 2269.225080] do_mkdirat+0x8f/0x2b0 [ 2269.225812] ? user_path_create+0xf0/0xf0 [ 2269.226672] do_syscall_64+0x33/0x40 [ 2269.227441] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2269.228493] RIP: 0033:0x7f3bf0652c27 [ 2269.229262] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2269.233045] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2269.234603] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf0652c27 [ 2269.236068] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2269.237532] RBP: 00007f3bedbc9040 R08: 0000000000000000 R09: 0000000000020020 [ 2269.238991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2269.240454] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:32:10 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@ocfs2_parent={0x18, 0x2, {{0x7, 0x9, 0x7}, {0x5, 0x4, 0x20}}}, &(0x7f0000000680), 0x1000) 22:32:10 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1800, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:10 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:10 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchownat(r0, &(0x7f0000000200)='./file0/file0\x00', 0xee00, 0xffffffffffffffff, 0x1000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x50200, 0x0) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x501000, 0x8e) 22:32:10 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 4) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2269.681373] FAULT_INJECTION: forcing a failure. [ 2269.681373] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.683433] CPU: 0 PID: 11286 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2269.684591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2269.685986] Call Trace: [ 2269.686435] dump_stack+0x107/0x167 [ 2269.687059] should_fail.cold+0x5/0xa [ 2269.687715] should_failslab+0x5/0x20 [ 2269.688391] __kmalloc_track_caller+0x79/0x370 [ 2269.689172] ? strndup_user+0x74/0xe0 [ 2269.689816] ? getname_flags.part.0+0x1dd/0x4f0 [ 2269.690613] memdup_user+0x22/0xd0 [ 2269.691213] strndup_user+0x74/0xe0 [ 2269.691841] __x64_sys_mount+0x133/0x300 [ 2269.692527] ? copy_mnt_ns+0xa00/0xa00 [ 2269.693204] do_syscall_64+0x33/0x40 [ 2269.693838] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2269.694710] RIP: 0033:0x7f3bf065504a [ 2269.695340] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2269.698573] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2269.699891] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2269.701101] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2269.702305] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2269.703500] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2269.704702] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:32:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 5) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:26 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x480000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:32:26 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:26 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:26 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0xb00, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:26 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:26 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2285.073633] FAULT_INJECTION: forcing a failure. [ 2285.073633] name failslab, interval 1, probability 0, space 0, times 0 [ 2285.076334] CPU: 0 PID: 11297 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2285.077866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2285.079664] Call Trace: [ 2285.080242] dump_stack+0x107/0x167 [ 2285.081033] should_fail.cold+0x5/0xa [ 2285.081873] ? create_object.isra.0+0x3a/0xa20 [ 2285.082869] should_failslab+0x5/0x20 [ 2285.083697] kmem_cache_alloc+0x5b/0x310 [ 2285.084587] create_object.isra.0+0x3a/0xa20 [ 2285.085551] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2285.086660] __kmalloc_track_caller+0x177/0x370 [ 2285.087669] ? strndup_user+0x74/0xe0 [ 2285.088504] ? getname_flags.part.0+0x1dd/0x4f0 [ 2285.089526] memdup_user+0x22/0xd0 [ 2285.090303] strndup_user+0x74/0xe0 [ 2285.091095] __x64_sys_mount+0x133/0x300 [ 2285.091988] ? copy_mnt_ns+0xa00/0xa00 [ 2285.092843] do_syscall_64+0x33/0x40 [ 2285.093660] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2285.094767] RIP: 0033:0x7f3bf065504a [ 2285.095569] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2285.099564] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2285.101224] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2285.102782] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2285.104326] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2285.105880] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2285.107425] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:32:26 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:26 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:26 executing program 6: getpeername$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, &(0x7f00000001c0)=0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000280)=0x80) r0 = socket$unix(0x1, 0x2, 0x0) sendto(r0, &(0x7f00000002c0)="3096474fe23de5247fb62d9bc39e762e8e39cce6b32c39ebf3462cb82f4b6b3164c16876d8e35515e581e3909713803228bfc16182d68db9f20080e0a0a1001bf130b8f51538c299b0917f35a4da8f46aea8a1bd0e28aca6d8c46e6d3f861423596fdaf20565a8e173d89bbfe6a7c40c8e7bfae3bf819fd4874a8409b8c48ec356ea61fbe867a1bb4095009f15779e4e7547405ed1e02e966036dc8cfb0729abec8d53d8a108c330b91f6f6b4e4b651b9cf594bfce6e53cd6ca98b2b5994930f48", 0xc1, 0x580d5, 0x0, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:32:26 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(0x0, &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 6) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:39 executing program 0: prlimit64(0x0, 0xb, &(0x7f00000003c0), 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x3938700}}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{r0, r1+60000000}, {0x77359400}}, 0x0) r2 = getpgid(0x0) timer_create(0x6, &(0x7f0000000240)={0x0, 0x34, 0x0, @tid=r2}, &(0x7f0000000880)=0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000900)={{r4, r5+60000000}}, &(0x7f0000001940)) timer_gettime(r3, &(0x7f0000000100)) 22:32:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 22:32:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9, 0x20010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}, 0x1, 0x0, 0x1}, 0x8001) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) 22:32:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x41ed, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1800, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2298.379361] FAULT_INJECTION: forcing a failure. [ 2298.379361] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2298.381006] CPU: 1 PID: 11346 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2298.381895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.382963] Call Trace: [ 2298.383306] dump_stack+0x107/0x167 [ 2298.383777] should_fail.cold+0x5/0xa [ 2298.384270] _copy_from_user+0x2e/0x1b0 [ 2298.384787] memdup_user+0x65/0xd0 [ 2298.385243] strndup_user+0x74/0xe0 [ 2298.385716] __x64_sys_mount+0x133/0x300 [ 2298.386243] ? copy_mnt_ns+0xa00/0xa00 [ 2298.386751] ? copy_mnt_ns+0xa00/0xa00 [ 2298.387262] do_syscall_64+0x33/0x40 [ 2298.387744] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2298.388409] RIP: 0033:0x7f3bf065504a [ 2298.388889] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.391271] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2298.392254] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2298.393179] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2298.394106] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2298.395024] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2298.395948] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:32:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x3}, 0x4) socket$packet(0x11, 0x3, 0x300) close(r1) 22:32:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)) symlink(0xfffffffffffffffc, &(0x7f0000000180)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rfcomm\x00') unlinkat(r0, &(0x7f0000000240)='./file1\x00', 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x1911}}, './file0\x00'}) 22:32:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 7) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2298.520560] FAULT_INJECTION: forcing a failure. [ 2298.520560] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.523280] CPU: 0 PID: 11361 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2298.524782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.526593] Call Trace: [ 2298.527169] dump_stack+0x107/0x167 [ 2298.527956] should_fail.cold+0x5/0xa [ 2298.528783] ? copy_mount_options+0x55/0x180 [ 2298.529739] should_failslab+0x5/0x20 [ 2298.530574] kmem_cache_alloc_trace+0x55/0x320 [ 2298.531555] ? _copy_from_user+0xfb/0x1b0 [ 2298.532455] copy_mount_options+0x55/0x180 [ 2298.533368] __x64_sys_mount+0x1a8/0x300 [ 2298.534246] ? copy_mnt_ns+0xa00/0xa00 [ 2298.535095] do_syscall_64+0x33/0x40 [ 2298.535895] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2298.536999] RIP: 0033:0x7f3bf065504a [ 2298.537797] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.541761] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2298.543409] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2298.544952] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2298.546505] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2298.548048] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2298.549589] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:32:39 executing program 6: unshare(0x18000a00) r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000180)=0x1, 0x4) bind$inet(r0, &(0x7f0000000c00)={0x2, 0x0, @multicast2}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/50, 0x32}], 0x1, &(0x7f0000000100)=""/28, 0x1c}, 0x12}], 0x1, 0x1020, &(0x7f0000000200)={r1, r2+60000000}) 22:32:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 8) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000003c0)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000, 0x0, 0x0, 0x4}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f00000010c0)='-*{^]%:\x00', &(0x7f0000001100)='./file1\x00', 0xffffffffffffffff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x161001, 0x0) creat(&(0x7f0000000080)='./file0/file0\x00', 0x80) r3 = getpgrp(0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) syz_open_procfs(r4, &(0x7f0000000100)='net/ip6_tables_names\x00') tgkill(0x0, r3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pipe(&(0x7f0000000140)) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f0000000200)={0x0, 0x8, [0x182000000000, 0x6, 0x80000001, 0x9], &(0x7f0000000180)=[0x0]}) stat(&(0x7f0000000300)='\x00', &(0x7f0000000340)) openat(r2, &(0x7f00000011c0)='./file1\x00', 0x2a040, 0x2) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x6b) unshare(0x48020200) 22:32:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 22:32:39 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xed41, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2298.747404] FAULT_INJECTION: forcing a failure. [ 2298.747404] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.749567] CPU: 1 PID: 11382 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2298.750779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2298.752216] Call Trace: [ 2298.752674] dump_stack+0x107/0x167 [ 2298.753306] should_fail.cold+0x5/0xa [ 2298.753970] ? copy_mount_options+0x55/0x180 [ 2298.754743] should_failslab+0x5/0x20 [ 2298.755404] kmem_cache_alloc_trace+0x55/0x320 [ 2298.756200] ? _copy_from_user+0xfb/0x1b0 [ 2298.756925] copy_mount_options+0x55/0x180 [ 2298.757658] __x64_sys_mount+0x1a8/0x300 [ 2298.758366] ? copy_mnt_ns+0xa00/0xa00 [ 2298.759051] do_syscall_64+0x33/0x40 [ 2298.759694] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2298.760583] RIP: 0033:0x7f3bf065504a [ 2298.761233] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2298.764443] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2298.765764] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2298.767004] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2298.768249] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2298.769492] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2298.770742] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:32:39 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r3, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:55 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 22:32:55 executing program 6: ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, &(0x7f0000000040)={0xa8a, 0x9a3a, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x0, 0x2}, 0x6) 22:32:55 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 9) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:55 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:32:55 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x80000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:55 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r3, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:32:55 executing program 0: syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, &(0x7f0000000300)) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='./0\x00\x00\x00\x00\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001700)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=0xee01, @ANYBLOB="2e2f66696c652fe1451d4e7b754bc7f05f0ff404807bf64d176a29993195992c14f39ee8328796f81d1886f6cb48f1ed71a941835b5840190114208ef9dda4756eab00fcd38d0a302906ffc3e8f25260ef7b4e28db855ed9e895bd4b0fbdedef955a9ddf4161dc9347ef97623a3ebf9ca8933a81653dd955d769a92740fbed0519a0fe8fb2bb1420fa5a24997c0cf4682cd464c3bcd44c267b10cfd7565652376257be8c2ef9d94e9ad1d44011543b4d0e2c77577a1157a58a7edab4a0981d3549776f00"/210]) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000960000090005e0ff00000000000500008048000000"], 0x24}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x40, &(0x7f0000000780)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_L}, {@debug={'debug', 0x3d, 0xffff}}, {@fscache}, {@noextend}], [{@dont_measure}, {@smackfsroot}, {@obj_user={'obj_user', 0x3d, 'syzkaller0\x00'}}, {@uid_lt}, {@euid_gt}, {@appraise_type}, {@obj_user={'obj_user', 0x3d, 'wlan1\x00'}}, {@obj_user={'obj_user', 0x3d, 'batadv_slave_1\x00'}}, {@obj_type}]}}) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) preadv(r5, &(0x7f0000000200)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1, 0xffff57e9, 0x4) r6 = accept4$bt_l2cap(r5, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x80000) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80202, 0x100) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="ff02000000006fbd20b905c3cc544a2ee8000000000600020008000200", @ANYRES32=r8, @ANYBLOB="0800050002000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="b23628bd7000ffdbdf25700000000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a00060008021100000100000a000600ffffffffffff00000a0006000802110000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x8c0}, 0x48010) openat(r7, &(0x7f0000000380)='./file0\x00', 0x20000, 0x20) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r6, 0x8982, &(0x7f00000002c0)={0x8, 'batadv_slave_1\x00', {'syzkaller0\x00'}, 0x7ff}) [ 2314.225405] FAULT_INJECTION: forcing a failure. [ 2314.225405] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2314.227968] CPU: 1 PID: 11409 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2314.229497] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2314.231133] Call Trace: [ 2314.231654] dump_stack+0x107/0x167 [ 2314.232368] should_fail.cold+0x5/0xa [ 2314.233125] _copy_from_user+0x2e/0x1b0 [ 2314.233910] copy_mount_options+0x76/0x180 [ 2314.234751] __x64_sys_mount+0x1a8/0x300 [ 2314.235551] ? copy_mnt_ns+0xa00/0xa00 [ 2314.236328] do_syscall_64+0x33/0x40 [ 2314.237066] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2314.238089] RIP: 0033:0x7f3bf065504a [ 2314.238824] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2314.242459] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2314.243969] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2314.245390] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2314.246813] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2314.248223] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2314.249664] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:32:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc02c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1831c1, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}, {&(0x7f00000004c0)="1296ca6b2afc3278755b7cdfd45d8a59295daccda003be4aa322e04b03eb93b79518fc6ddc4a2c882d4cd9e332e158e7c6b37c065ac852b96c1940a9c893384b58a2f014e48660", 0x47}, {&(0x7f0000000340)}, {&(0x7f0000000540)="021d4747028b47c14b5e1b661173253d1f3becb69e674943f82f6f535f425b165476b035d2ce9eda801c14d4e45721d17f56c5934bfd13dc76901ebed1a1183e507adbd279b8c00f7dbef739702be0c4b7b4ce2622cfef50026b5127918d1ddc96db6944d2d13e2ba79b13afba4d575fd8593e7c195343e3d3661a6adbe66f54310e81", 0x83}], 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept$inet6(r2, &(0x7f0000000980)={0xa, 0x0, 0x0, @private1}, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), r0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="206c787bdbff32c41c01728a3dc4b32fc9040000000000", @ANYRES16=r3, @ANYBLOB="87ce2abd7000ffdbdf250100000008000800000000000800090001000000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4002) fallocate(r2, 0x0, 0x0, 0x8000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x4) lseek(0xffffffffffffffff, 0x6, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x187) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x24, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x78}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x8004) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e7, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) symlinkat(&(0x7f0000000100)='.\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') openat2(0xffffffffffffffff, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x8}, 0x18) openat(r2, &(0x7f0000000440)='./file0\x00', 0x509840, 0x58) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 22:33:11 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = dup2(r1, r1) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r2, 0xf504, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='\\-.[/[\x00') r4 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x12, r5, 0xc76cc000) fsetxattr$security_ima(r4, &(0x7f0000000100), &(0x7f0000000200)=@ng={0x4, 0x14, "e2"}, 0x3, 0x2) syz_mount_image$nfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="b09456e1cc1abe3be01b5ab628f4f34a9a6cc65a92f9877ae3771e21d09c820335483bdc14c4696a6b7661a1c0cd40bf760bbd9d7976fb11c6db4c32f90d212b2447c78c0bb70e2341b9135a36e3d037b1", 0x51, 0xffffffffffffffff}, {&(0x7f00000003c0)="734392bf111e34ad89833539b8bc9d0c90f5905723c06cb62a77178037bdf869a9e9f9cf93423b1c6c08e00a09fffd1739e62303500b707c15a15ce9cff7d35d67b8f1929ea5dbb86e30efc44374d16ea8b43e80ec4d305a95b6b85adc47c8abfc", 0x61, 0x40}, {0x0, 0x0, 0x5}], 0x0, &(0x7f0000000580)={[{'-$'}, {'rfdno'}, {'9p\x00'}, {'[\x89'}], [{@hash}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv2(r4, &(0x7f0000000080)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x5c0d8773, 0x0, 0xb) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@noextend}, {@loose}, {@version_L}, {@cache_loose}, {@posixacl}, {@uname={'uname', 0x3d, 'hash'}}, {@version_9p2000}, {@version_L}], [{@dont_hash}, {@subj_user={'subj_user', 0x3d, ']<'}}]}}) 22:33:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xa, 0x300) r0 = socket$inet(0x2, 0x3, 0x6) pidfd_send_signal(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0xb29}, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000000), 0x400000d, 0xff03000000000000) 22:33:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 22:33:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 10) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r2 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r3, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2330.386093] audit: type=1400 audit(1736289191.524:14): avc: denied { map } for pid=11437 comm="syz-executor.0" path="pipe:[39420]" dev="pipefs" ino=39420 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 2330.392652] FAULT_INJECTION: forcing a failure. [ 2330.392652] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.395807] CPU: 0 PID: 11441 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2330.397383] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.399259] Call Trace: [ 2330.399861] dump_stack+0x107/0x167 [ 2330.400715] should_fail.cold+0x5/0xa [ 2330.401627] ? getname_flags.part.0+0x50/0x4f0 [ 2330.402698] should_failslab+0x5/0x20 [ 2330.403599] kmem_cache_alloc+0x5b/0x310 [ 2330.404569] getname_flags.part.0+0x50/0x4f0 [ 2330.405586] user_path_at_empty+0xa1/0x100 [ 2330.406555] __x64_sys_mount+0x1e9/0x300 [ 2330.407507] ? copy_mnt_ns+0xa00/0xa00 [ 2330.408430] do_syscall_64+0x33/0x40 [ 2330.409268] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2330.410398] RIP: 0033:0x7f3bf065504a [ 2330.411260] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.415414] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2330.417133] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2330.418766] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2330.420325] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2330.421879] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2330.423488] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 [ 2330.437714] nfs: Unknown parameter '-$' 22:33:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) [ 2330.480740] FAULT_INJECTION: forcing a failure. [ 2330.480740] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.483597] CPU: 0 PID: 11451 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2330.485133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.486977] Call Trace: [ 2330.487575] dump_stack+0x107/0x167 [ 2330.488386] should_fail.cold+0x5/0xa [ 2330.489247] should_failslab+0x5/0x20 [ 2330.490090] __kmalloc_track_caller+0x79/0x370 [ 2330.491108] ? strndup_user+0x74/0xe0 [ 2330.491956] memdup_user+0x22/0xd0 [ 2330.492721] strndup_user+0x74/0xe0 [ 2330.493521] __x64_sys_mount+0x133/0x300 [ 2330.494405] ? copy_mnt_ns+0xa00/0xa00 [ 2330.495317] do_syscall_64+0x33/0x40 [ 2330.496133] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2330.497278] RIP: 0033:0x7f19cfd89b19 [ 2330.498081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.502055] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2330.503707] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2330.505275] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2330.506832] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2330.508390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2330.509937] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 22:33:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 11) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2330.625290] FAULT_INJECTION: forcing a failure. [ 2330.625290] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2330.628206] CPU: 0 PID: 11463 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2330.629724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.631520] Call Trace: [ 2330.632092] dump_stack+0x107/0x167 [ 2330.632883] should_fail.cold+0x5/0xa [ 2330.633719] __alloc_pages_nodemask+0x182/0x600 [ 2330.634739] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2330.636070] ? __up_read+0x19f/0x7a0 [ 2330.636885] ? perf_trace_lock+0xac/0x490 22:33:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 2) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2330.637792] ? _down_write_nest_lock+0x160/0x160 22:33:11 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x2, 'client1\x00', 0x0, "591443f71e3d9c7a", "1700000000000000080dbafa9825a5bc6cd890639dfb8a294b31cbe89ef9d7c7"}) r2 = signalfd4(r1, &(0x7f00000001c0)={[0x1]}, 0x8, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYRESHEX, @ANYRES32=0x0, @ANYBLOB="00000000c3308000"/112], 0xb8}}, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000003c0)=0xc) r3 = pidfd_open(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={r3, 0x0, 0x800, 0x2}) r4 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x48, 0x0, 0x0, 0x9, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r5, r4, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001500)={&(0x7f00000003c0)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x20004010}, 0x4040890) syz_io_uring_setup(0x5606, &(0x7f0000000040)={0x0, 0xef33, 0x0, 0x3, 0x256}, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000100)) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='smaps\x00') syz_io_uring_setup(0x67c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000380)) pipe2(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xc000) io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 2330.638978] alloc_pages_current+0x187/0x280 [ 2330.639984] allocate_slab+0x26f/0x380 [ 2330.640792] ___slab_alloc+0x470/0x700 [ 2330.641592] ? fs_reclaim_release+0x94/0xd0 [ 2330.642479] ? getname_flags.part.0+0x50/0x4f0 [ 2330.643437] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2330.644521] ? exc_page_fault+0xca/0x1a0 [ 2330.645365] ? getname_flags.part.0+0x50/0x4f0 [ 2330.646304] ? kmem_cache_alloc+0x301/0x310 [ 2330.647199] kmem_cache_alloc+0x301/0x310 [ 2330.648066] getname_flags.part.0+0x50/0x4f0 [ 2330.649195] user_path_at_empty+0xa1/0x100 [ 2330.650070] __x64_sys_mount+0x1e9/0x300 [ 2330.651127] ? copy_mnt_ns+0xa00/0xa00 [ 2330.652156] do_syscall_64+0x33/0x40 [ 2330.652925] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2330.654237] RIP: 0033:0x7f3bf065504a [ 2330.655071] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.659803] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2330.661524] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2330.662990] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2330.664461] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2330.665934] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2330.667406] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:33:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 22:33:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2330.719481] FAULT_INJECTION: forcing a failure. [ 2330.719481] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.720989] CPU: 1 PID: 11470 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2330.721779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.722712] Call Trace: [ 2330.723019] dump_stack+0x107/0x167 [ 2330.723442] should_fail.cold+0x5/0xa [ 2330.723877] ? create_object.isra.0+0x3a/0xa20 [ 2330.724396] should_failslab+0x5/0x20 [ 2330.724828] kmem_cache_alloc+0x5b/0x310 [ 2330.725293] create_object.isra.0+0x3a/0xa20 [ 2330.725788] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2330.726365] __kmalloc_track_caller+0x177/0x370 [ 2330.726888] ? strndup_user+0x74/0xe0 [ 2330.727328] memdup_user+0x22/0xd0 [ 2330.727728] strndup_user+0x74/0xe0 [ 2330.728143] __x64_sys_mount+0x133/0x300 [ 2330.728599] ? copy_mnt_ns+0xa00/0xa00 [ 2330.729049] do_syscall_64+0x33/0x40 [ 2330.729471] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2330.730052] RIP: 0033:0x7f19cfd89b19 [ 2330.730473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.732567] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2330.733438] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2330.734256] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2330.735082] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2330.735906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2330.736722] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 22:33:11 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r1, 0x550c, 0x20000000) r2 = dup2(r1, r1) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r2, 0xf504, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='\\-.[/[\x00') r4 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x12, r5, 0xc76cc000) fsetxattr$security_ima(r4, &(0x7f0000000100), &(0x7f0000000200)=@ng={0x4, 0x14, "e2"}, 0x3, 0x2) syz_mount_image$nfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="b09456e1cc1abe3be01b5ab628f4f34a9a6cc65a92f9877ae3771e21d09c820335483bdc14c4696a6b7661a1c0cd40bf760bbd9d7976fb11c6db4c32f90d212b2447c78c0bb70e2341b9135a36e3d037b1", 0x51, 0xffffffffffffffff}, {&(0x7f00000003c0)="734392bf111e34ad89833539b8bc9d0c90f5905723c06cb62a77178037bdf869a9e9f9cf93423b1c6c08e00a09fffd1739e62303500b707c15a15ce9cff7d35d67b8f1929ea5dbb86e30efc44374d16ea8b43e80ec4d305a95b6b85adc47c8abfc", 0x61, 0x40}, {0x0, 0x0, 0x5}], 0x0, &(0x7f0000000580)={[{'-$'}, {'rfdno'}, {'9p\x00'}, {'[\x89'}], [{@hash}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv2(r4, &(0x7f0000000080)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x5c0d8773, 0x0, 0xb) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000140)=0x7c0283a40842d60c) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@noextend}, {@loose}, {@version_L}, {@cache_loose}, {@posixacl}, {@uname={'uname', 0x3d, 'hash'}}, {@version_9p2000}, {@version_L}], [{@dont_hash}, {@subj_user={'subj_user', 0x3d, ']<'}}]}}) [ 2330.802890] nfs: Unknown parameter '-$' 22:33:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x0, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 3) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:12 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="50b31d6a", 0x4}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000290000004300"/24], 0x18}, 0x0) [ 2330.909941] FAULT_INJECTION: forcing a failure. [ 2330.909941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2330.911389] CPU: 1 PID: 11492 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2330.912167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2330.913102] Call Trace: [ 2330.913406] dump_stack+0x107/0x167 [ 2330.913827] should_fail.cold+0x5/0xa [ 2330.914262] _copy_from_user+0x2e/0x1b0 [ 2330.914713] memdup_user+0x65/0xd0 [ 2330.915113] strndup_user+0x74/0xe0 [ 2330.915533] __x64_sys_mount+0x133/0x300 [ 2330.915992] ? copy_mnt_ns+0xa00/0xa00 [ 2330.916442] do_syscall_64+0x33/0x40 [ 2330.916869] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2330.917452] RIP: 0033:0x7f19cfd89b19 [ 2330.917874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2330.919991] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2330.920862] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2330.921682] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2330.922491] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2330.923314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2330.924132] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 22:33:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000007c0)={&(0x7f0000000900)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000429bd7000fbdbdf254ab4b8bb6a912fdc81e9080000000c00ad5a1c8f26256c169cb8ef993e49379d6e140644f1489e5452cedbe0394fe56c6a272024adafbcdd4c0c858dd7578659afa72fb9132bbf6be535700f8f82df3f6b78cd0684ac733f658e4da90a1c92d58ce67369a635b55a"], 0x20}, 0x1, 0x0, 0x0, 0x20000081}, 0x8000) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000100)=""/98, 0x62}, {&(0x7f0000000180)=""/184, 0xb8}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f00000002c0)=""/136, 0x88}, {&(0x7f0000000880)=""/70, 0x46}, {&(0x7f0000000840)=""/20, 0x14}, {&(0x7f00000003c0)=""/38, 0x26}, {&(0x7f00000004c0)=""/158, 0x9e}], 0x8, &(0x7f0000000600)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x158}, 0x40000101) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1010, 0x0, 0x0, 0x8, 0x1, 0x2}, r2, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000980)={0x148, 0x0, 0x0, 0x70bd26, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xfffffff7, 0x6a}}}}, [@NL80211_ATTR_BSS_BASIC_RATES={0x1c, 0x24, [{0x3, 0x1}, {0x3}, {0x6c}, {0x48, 0x1}, {0x9}, {0x9, 0x1}, {0x6c, 0x1}, {0x4, 0x1}, {0x9}, {0x24, 0x1}, {0x1}, {0x3, 0x1}, {0x36, 0x1}, {0x9, 0x1}, {0x36}, {}, {0x1b}, {0x18, 0x1}, {0xb}, {0x30}, {0x6, 0x1}, {0x1b}, {0x3, 0x1}, {0xba9856e5775acf2a, 0x1}]}, @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xc}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1a3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x3}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1630}, @NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x6}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_MESH_CONFIG={0x4c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x100}, @NL80211_MESHCONF_POWER_MODE={0x8, 0x1a, 0x3}, @NL80211_MESHCONF_MAX_PEER_LINKS={0x6, 0x4, 0xce}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5, 0xe, 0x2}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0xfd}, @NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x78}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5, 0x1d, 0x1}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x1}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}]}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x146}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}], @NL80211_ATTR_SOCKET_OWNER={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x117}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xc}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xfffffff7}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16c1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]]}, 0x148}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) io_setup(0x1, &(0x7f00000000c0)=0x0) io_submit(r4, 0x58, &(0x7f00000000c0)) 22:33:27 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 12) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x1f, 0x9, 0x4, 0x9, 0x0, 0x1, 0x110c8, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x1}, 0x4844, 0x5, 0x7, 0x6, 0x8001, 0x200, 0x7, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0xe, r1, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x100000001) 22:33:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:27 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 1) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2346.105945] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2346.119567] FAULT_INJECTION: forcing a failure. [ 2346.119567] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.122575] CPU: 0 PID: 11508 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2346.124231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.126197] Call Trace: [ 2346.126826] dump_stack+0x107/0x167 [ 2346.127702] should_fail.cold+0x5/0xa [ 2346.128608] ? getname_flags.part.0+0x50/0x4f0 [ 2346.128671] FAULT_INJECTION: forcing a failure. [ 2346.128671] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.129691] should_failslab+0x5/0x20 [ 2346.129712] kmem_cache_alloc+0x5b/0x310 [ 2346.129739] getname_flags.part.0+0x50/0x4f0 [ 2346.129765] user_path_at_empty+0xa1/0x100 [ 2346.135648] __x64_sys_mount+0x1e9/0x300 [ 2346.136619] ? copy_mnt_ns+0xa00/0xa00 [ 2346.137559] do_syscall_64+0x33/0x40 [ 2346.138443] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2346.139658] RIP: 0033:0x7f19cfd89b19 [ 2346.140535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.144863] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2346.146638] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2346.148311] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2346.149984] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.151643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2346.153318] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 [ 2346.155031] CPU: 1 PID: 11512 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2346.156358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.157934] Call Trace: [ 2346.158430] dump_stack+0x107/0x167 [ 2346.159124] should_fail.cold+0x5/0xa [ 2346.159844] ? getname_flags.part.0+0x50/0x4f0 [ 2346.160702] should_failslab+0x5/0x20 [ 2346.161413] kmem_cache_alloc+0x5b/0x310 [ 2346.162188] getname_flags.part.0+0x50/0x4f0 [ 2346.163018] getname_flags+0x9a/0xe0 [ 2346.163727] do_mkdirat+0x8f/0x2b0 [ 2346.164398] ? user_path_create+0xf0/0xf0 [ 2346.165191] do_syscall_64+0x33/0x40 [ 2346.165889] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2346.166849] RIP: 0033:0x7f71d816cc27 [ 2346.167548] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.171016] RSP: 002b:00007f71d56e2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2346.172452] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71d816cc27 [ 2346.173798] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2346.175143] RBP: 00007f71d56e3040 R08: 0000000000000000 R09: 0000000000020020 [ 2346.176488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2346.177827] R13: 00000000200000c0 R14: 00007f71d56e3000 R15: 0000000020000140 [ 2346.189781] FAULT_INJECTION: forcing a failure. [ 2346.189781] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2346.192161] CPU: 1 PID: 11514 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2346.193452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.194995] Call Trace: [ 2346.195482] dump_stack+0x107/0x167 [ 2346.196163] should_fail.cold+0x5/0xa [ 2346.196873] strncpy_from_user+0x34/0x470 [ 2346.197642] getname_flags.part.0+0x95/0x4f0 [ 2346.198460] user_path_at_empty+0xa1/0x100 [ 2346.199249] __x64_sys_mount+0x1e9/0x300 [ 2346.200000] ? copy_mnt_ns+0xa00/0xa00 [ 2346.200725] do_syscall_64+0x33/0x40 [ 2346.201409] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2346.202353] RIP: 0033:0x7f3bf065504a [ 2346.203046] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.206435] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2346.207846] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2346.209158] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2346.210475] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2346.211801] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2346.213122] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:33:27 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x2008, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000800)=ANY=[]) r2 = socket$netlink(0x10, 0x3, 0x0) fallocate(r0, 0x30, 0xffffffffffffff75, 0x10001) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000200)={0x2015}}, 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2, {0x1a50c}}, './file1\x00'}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x200000, 0x0) openat(r3, &(0x7f0000000400)='./file1\x00', 0x0, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x3000000a}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x8001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x90}, 0x0, 0x10, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) preadv(r3, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/29, 0x1d}, {&(0x7f0000000840)=""/212, 0xd4}], 0x2, 0xffff57e9, 0x4) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x80000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfa, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x10000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xb}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000091}, 0x30004840) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 22:33:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2346.279927] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2346.280344] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2346.299670] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2346.301020] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2346.302357] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 22:33:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 13) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:27 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x7000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_5={0x14, 0x5, {0x9, 0x3, 0x7fff, 0x8, 0x83ef}}, 0xc300) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000100)=0x8b, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) syz_io_uring_setup(0x7781, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 22:33:27 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 5) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2346.450896] FAULT_INJECTION: forcing a failure. [ 2346.450896] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.452809] CPU: 1 PID: 11536 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2346.453860] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.455103] Call Trace: [ 2346.455505] dump_stack+0x107/0x167 [ 2346.456059] should_fail.cold+0x5/0xa [ 2346.456637] ? create_object.isra.0+0x3a/0xa20 [ 2346.457325] should_failslab+0x5/0x20 [ 2346.457897] kmem_cache_alloc+0x5b/0x310 [ 2346.458508] ? __might_fault+0xd3/0x180 [ 2346.459104] create_object.isra.0+0x3a/0xa20 [ 2346.459771] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2346.460538] kmem_cache_alloc+0x159/0x310 [ 2346.461165] getname_flags.part.0+0x50/0x4f0 [ 2346.461839] user_path_at_empty+0xa1/0x100 [ 2346.462482] __x64_sys_mount+0x1e9/0x300 [ 2346.463092] ? copy_mnt_ns+0xa00/0xa00 [ 2346.463688] do_syscall_64+0x33/0x40 [ 2346.464254] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2346.465024] RIP: 0033:0x7f19cfd89b19 [ 2346.465585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.468351] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2346.469486] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2346.470550] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2346.471615] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.472684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2346.473749] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 [ 2346.530827] FAULT_INJECTION: forcing a failure. [ 2346.530827] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.533936] CPU: 0 PID: 11542 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2346.535645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.537697] Call Trace: [ 2346.538351] dump_stack+0x107/0x167 [ 2346.539252] should_fail.cold+0x5/0xa [ 2346.540206] ? alloc_fs_context+0x57/0x840 [ 2346.541253] should_failslab+0x5/0x20 [ 2346.542192] kmem_cache_alloc_trace+0x55/0x320 [ 2346.543308] ? cap_capable+0x1cd/0x230 [ 2346.544274] alloc_fs_context+0x57/0x840 [ 2346.545274] path_mount+0x962/0x2120 [ 2346.546191] ? strncpy_from_user+0x9e/0x470 [ 2346.547245] ? finish_automount+0xa90/0xa90 [ 2346.548309] ? getname_flags.part.0+0x1dd/0x4f0 [ 2346.549457] __x64_sys_mount+0x282/0x300 [ 2346.550448] ? copy_mnt_ns+0xa00/0xa00 [ 2346.551416] do_syscall_64+0x33/0x40 [ 2346.552333] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2346.553588] RIP: 0033:0x7f3bf065504a [ 2346.554488] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.558943] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2346.560790] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2346.562515] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2346.564243] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2346.565963] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2346.567672] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:33:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:43 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 2) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:43 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1}, 0x14}}, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000001080), &(0x7f00000013c0)=0x10) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4ea0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00', 0x0, [0x40, 0x0, 0x5, 0x2]}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000001480)={0x8, 'veth1_to_team\x00', {}, 0x8bf}) syz_io_uring_setup(0x6a18, &(0x7f00000000c0)={0x0, 0xdb12, 0x1, 0x0, 0x1a4}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x40, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001100)={0x0, 0x80, 0x4, 0xba, 0x7b, 0x0, 0x0, 0x9, 0x8108, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x1f, 0x0, 0x8, 0x6, 0xb0, 0x6, 0x0, 0x5, 0x0, 0x8}, 0xffffffffffffffff, 0x7, r4, 0x8) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/diskstats\x00', 0x0, 0x0) pread64(r5, &(0x7f0000000040)=""/4126, 0x101e, 0x2000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001380)=@IORING_OP_READV=@pass_iovec={0x1, 0xf1930b2697df3da1, 0x0, @fd_index, 0x4, &(0x7f0000001340)=[{&(0x7f0000001180)=""/82, 0x52}, {&(0x7f0000001200)=""/207, 0xcf}, {&(0x7f0000001300)=""/17, 0x11}], 0x3, 0xc, 0x1, {0x0, r6}}, 0x6) syz_io_uring_submit(r3, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x2007, @fd_index=0x7, 0x9, 0xad, 0xffffff81, 0x1c, 0x0, {0x2, r6}}, 0x80000001) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f000030015000100000000000000a603000000007b2c9dd02da45842000000000000000000000000000000005b40000000000000000000007eca1d25", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="e00000010000000000000000000000000000000000000000ac1414bb00"/168], 0xf0}}, 0x0) 22:33:43 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 6) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2362.160502] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 22:33:43 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 14) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:43 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x204458}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, 0x1, 0x9, 0x0, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x82}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x1}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_TUPLE={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @NFCTH_STATUS={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000160011cd000000000000000000000000ff6b2ab94856fda45a339635c2955f6c8ad5b47db480d6635929a277d9d82d52058f9aa64a0c465c5f31e4"], 0x14}}, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000000c0)={0xffffff32, 0x0, 'client1\x00', 0x0, "59146c8c0a879c7a", "17639fca1e75b1026c0dbafa98a5a5c46cd890639dfb8a296b31cbe89ed9d7c7"}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x1, 0x1ff, 0x3f}) [ 2362.172582] FAULT_INJECTION: forcing a failure. [ 2362.172582] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2362.174879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=11568 comm=syz-executor.0 [ 2362.175353] CPU: 0 PID: 11565 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2362.179294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.181204] Call Trace: [ 2362.181806] dump_stack+0x107/0x167 [ 2362.182637] should_fail.cold+0x5/0xa [ 2362.183506] strncpy_from_user+0x34/0x470 [ 2362.184397] FAULT_INJECTION: forcing a failure. [ 2362.184397] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.184486] getname_flags.part.0+0x95/0x4f0 [ 2362.187733] user_path_at_empty+0xa1/0x100 [ 2362.188723] __x64_sys_mount+0x1e9/0x300 [ 2362.189645] ? copy_mnt_ns+0xa00/0xa00 [ 2362.190534] do_syscall_64+0x33/0x40 [ 2362.191374] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2362.192555] RIP: 0033:0x7f19cfd89b19 [ 2362.193401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.197595] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2362.199314] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2362.200954] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2362.202566] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.204188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2362.205832] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 [ 2362.207472] CPU: 1 PID: 11562 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2362.208886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.210577] Call Trace: [ 2362.211123] dump_stack+0x107/0x167 [ 2362.211866] should_fail.cold+0x5/0xa [ 2362.212651] ? create_object.isra.0+0x3a/0xa20 [ 2362.213594] should_failslab+0x5/0x20 [ 2362.214382] kmem_cache_alloc+0x5b/0x310 [ 2362.215215] ? ksys_write+0x21a/0x260 [ 2362.216014] create_object.isra.0+0x3a/0xa20 [ 2362.216922] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2362.217967] kmem_cache_alloc+0x159/0x310 [ 2362.218828] getname_flags.part.0+0x50/0x4f0 [ 2362.219728] getname_flags+0x9a/0xe0 [ 2362.220525] do_mkdirat+0x8f/0x2b0 [ 2362.221261] ? user_path_create+0xf0/0xf0 [ 2362.222116] do_syscall_64+0x33/0x40 [ 2362.222877] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2362.223925] RIP: 0033:0x7f71d816cc27 [ 2362.224712] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.228486] RSP: 002b:00007f71d56e2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2362.230022] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71d816cc27 [ 2362.231470] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2362.232933] RBP: 00007f71d56e3040 R08: 0000000000000000 R09: 0000000000020020 [ 2362.234392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2362.235855] R13: 00000000200000c0 R14: 00007f71d56e3000 R15: 0000000020000140 [ 2362.236945] FAULT_INJECTION: forcing a failure. [ 2362.236945] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.240370] CPU: 0 PID: 11569 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2362.241915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.243733] Call Trace: [ 2362.244338] dump_stack+0x107/0x167 [ 2362.245150] should_fail.cold+0x5/0xa [ 2362.245999] ? create_object.isra.0+0x3a/0xa20 [ 2362.247014] should_failslab+0x5/0x20 [ 2362.247858] kmem_cache_alloc+0x5b/0x310 [ 2362.248783] create_object.isra.0+0x3a/0xa20 [ 2362.249750] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2362.250881] kmem_cache_alloc_trace+0x151/0x320 [ 2362.251906] ? cap_capable+0x1cd/0x230 [ 2362.252801] alloc_fs_context+0x57/0x840 [ 2362.253701] path_mount+0x962/0x2120 [ 2362.254531] ? strncpy_from_user+0x9e/0x470 [ 2362.255481] ? finish_automount+0xa90/0xa90 [ 2362.256471] ? getname_flags.part.0+0x1dd/0x4f0 [ 2362.257508] __x64_sys_mount+0x282/0x300 [ 2362.258403] ? copy_mnt_ns+0xa00/0xa00 [ 2362.259269] do_syscall_64+0x33/0x40 [ 2362.260089] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2362.261250] RIP: 0033:0x7f3bf065504a [ 2362.262073] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.266146] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2362.267820] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2362.269419] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2362.271004] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2362.272585] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2362.274137] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 [ 2362.293378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=11568 comm=syz-executor.0 22:33:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 22:33:43 executing program 0: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000600)={0x0, @in={0x2, 0x4e23, @broadcast}, @llc={0x1a, 0x310, 0xfb, 0x2, 0x80, 0x40, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x0, 0x2}}, 0xfff8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)='veth1_to_bond\x00', 0xfff, 0xe42, 0x35b}) syz_emit_ethernet(0x68, &(0x7f0000000100)={@multicast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "96153f", 0x32, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @remote, @mcast2, [{0x0, 0x1, "b157ee39d8bed3d9"}]}}}}}}, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) syz_emit_ethernet(0x98, &(0x7f0000000440)={@multicast, @random="f4038b55bc04", @void, {@mpls_uc={0x8847, {[{0x7f, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x4, 0x0, 0x1}, {0x4}], @generic="d11d643e1f73137eacbefdc886e3b4ed0a64b55a2fb0e1c0e0f06549fec995b10b8275b9ae973b3f250b269fe21f5c5c063f4ce6589fa7de4d3cff8eb69316b3f556d88cd7f9e814615f2ea51f35f3349f6bca7db0c761718543e845ab21b0e33feaa347a79409a395fc03bd2eb2c7a4c7faf8defa7f"}}}}, 0x0) syz_emit_ethernet(0x2b0, &(0x7f0000000180)={@multicast, @broadcast, @val={@val={0x9100, 0x3, 0x1, 0x3}, {0x8100, 0x0, 0x1, 0x3}}, {@ipv6={0x86dd, @icmpv6={0x7, 0x6, "bab227", 0x272, 0x3a, 0xff, @private2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x26}}, {[@hopopts={0x33, 0x1c, '\x00', [@generic={0xfc, 0x92, "58592a11a380281e6bbbfd9c4fd479243aaf78a3962bed91d690a09c6c787828e8265cd25760b936ee666dfb876a44dd5188014b17f3c7fe6fcf53aad0a091554779ef07ac70f59341a9d3da6a8b6c36633082c1a134f86ebb46d18ca3d8ff5d2813c8c8bf9ff879330ac99476ba504749e8dcb0aff0b126990a2a3e48c1858eb013fd1c4b9dd7363e1f505b195210e8ed1e"}, @calipso={0x7, 0x30, {0x1, 0xa, 0x0, 0xc8, [0x100, 0x8, 0xdbb8, 0xff, 0x2db]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x5}, @calipso={0x7, 0x10, {0x1, 0x2, 0x1f, 0x9fe, [0x0]}}]}, @srh={0x87, 0x2, 0x4, 0x1, 0x7, 0x0, 0x3ff, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}, @routing={0x84, 0x10, 0x1, 0x4, 0x0, [@private1={0xfc, 0x1, '\x00', 0x5}, @mcast1, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @rand_addr=' \x01\x00', @mcast1, @mcast2]}, @routing={0x88, 0x4, 0x2, 0x1f, 0x0, [@remote, @ipv4={'\x00', '\xff\xff', @remote}]}], @echo_request={0x80, 0x0, 0x0, 0x6, 0x6, "40ba6bc6f0317042b60dcbe67ed2b346d8f2c6d77b4754b468e159ca26b23cc75c6e25ad6fabddca40a44233909222b2312b682fbcec746a0f343c1865ebd6b5cce94be37c407b8c71aaaf50d658993780ac564e9bc0bf947ca0057b7aff05801996aab9015698da97b8470c1dbd3216d623e26ab08966917c020bcc8cfddf5d28fc0139086b65953cad713016a39eab5d8c9833e091445db3ba27ac2e2b17f07e792ed5791b03626a03c6f6dd14c7b8fccf"}}}}}}, &(0x7f0000000000)={0x1, 0x2, [0x8ae, 0xfbf, 0x93f, 0xbd9]}) syz_emit_ethernet(0x56, &(0x7f0000000500)={@link_local, @local, @void, {@canfd={0xd, {{0x4, 0x1, 0x1, 0x1}, 0x36, 0x3, 0x0, 0x0, "d6bd3e79c3d05191cfd9096fad923072adf2e87e7b925073f717814b93a9b29b37993f1b1889b9345ba23cf3b870bc6321bdf7be6d78d5e634d74d94014f3af8"}}}}, &(0x7f0000000580)={0x1, 0x1, [0xe54, 0xec4, 0x7aa, 0x103]}) syz_emit_ethernet(0x42, &(0x7f0000000080)={@multicast, @empty, @void, {@generic={0x88be, "15b120123640205212dd96540f3af752f7addcda190e6c0b63cfac90c8d05fb19784eb439a39b326fa00ffdb95a31058489ee716"}}}, 0x0) 22:33:43 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x9000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x9000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2362.454733] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 22:33:43 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 7) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:43 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 15) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2362.554608] FAULT_INJECTION: forcing a failure. [ 2362.554608] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.557483] CPU: 0 PID: 11592 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2362.559049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.560951] Call Trace: [ 2362.561553] dump_stack+0x107/0x167 [ 2362.562374] should_fail.cold+0x5/0xa [ 2362.563250] ? alloc_fs_context+0x57/0x840 [ 2362.564218] should_failslab+0x5/0x20 [ 2362.565113] kmem_cache_alloc_trace+0x55/0x320 [ 2362.566158] alloc_fs_context+0x57/0x840 [ 2362.567087] path_mount+0xaa3/0x2120 [ 2362.567932] ? strncpy_from_user+0x9e/0x470 [ 2362.568931] ? finish_automount+0xa90/0xa90 [ 2362.569900] ? getname_flags.part.0+0x1dd/0x4f0 [ 2362.570959] __x64_sys_mount+0x282/0x300 [ 2362.571860] ? copy_mnt_ns+0xa00/0xa00 [ 2362.572764] do_syscall_64+0x33/0x40 [ 2362.573612] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2362.574747] RIP: 0033:0x7f19cfd89b19 [ 2362.575570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.579688] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2362.581413] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2362.582999] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2362.584595] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2362.586175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2362.587770] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 22:33:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 22:33:43 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 3) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2362.665913] FAULT_INJECTION: forcing a failure. [ 2362.665913] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.668562] CPU: 1 PID: 11596 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2362.669989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.671699] Call Trace: [ 2362.672252] dump_stack+0x107/0x167 [ 2362.673014] should_fail.cold+0x5/0xa [ 2362.673806] ? create_object.isra.0+0x3a/0xa20 [ 2362.674758] should_failslab+0x5/0x20 [ 2362.675551] kmem_cache_alloc+0x5b/0x310 [ 2362.676416] create_object.isra.0+0x3a/0xa20 [ 2362.677333] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2362.678395] kmem_cache_alloc_trace+0x151/0x320 [ 2362.679367] ? cap_capable+0x1cd/0x230 [ 2362.680193] alloc_fs_context+0x57/0x840 [ 2362.681073] path_mount+0x962/0x2120 [ 2362.681852] ? strncpy_from_user+0x9e/0x470 [ 2362.682744] ? finish_automount+0xa90/0xa90 [ 2362.683638] ? getname_flags.part.0+0x1dd/0x4f0 [ 2362.684632] __x64_sys_mount+0x282/0x300 [ 2362.685477] ? copy_mnt_ns+0xa00/0xa00 [ 2362.686298] do_syscall_64+0x33/0x40 [ 2362.687072] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2362.688146] RIP: 0033:0x7f3bf065504a [ 2362.688923] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.692771] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2362.694345] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2362.695837] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2362.697327] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2362.698737] FAULT_INJECTION: forcing a failure. [ 2362.698737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2362.698818] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2362.698830] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 [ 2362.706107] CPU: 0 PID: 11599 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2362.707742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2362.709748] Call Trace: [ 2362.710400] dump_stack+0x107/0x167 [ 2362.711268] should_fail.cold+0x5/0xa [ 2362.712199] strncpy_from_user+0x34/0x470 [ 2362.713225] getname_flags.part.0+0x95/0x4f0 [ 2362.714289] getname_flags+0x9a/0xe0 [ 2362.715182] do_mkdirat+0x8f/0x2b0 [ 2362.716032] ? user_path_create+0xf0/0xf0 [ 2362.717055] do_syscall_64+0x33/0x40 [ 2362.717940] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2362.719153] RIP: 0033:0x7f71d816cc27 [ 2362.720033] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.724439] RSP: 002b:00007f71d56e2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2362.726248] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71d816cc27 [ 2362.727939] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2362.729649] RBP: 00007f71d56e3040 R08: 0000000000000000 R09: 0000000000020020 [ 2362.731331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2362.733049] R13: 00000000200000c0 R14: 00007f71d56e3000 R15: 0000000020000140 22:33:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', 0x0], 0x1000) fallocate(0xffffffffffffffff, 0x78, 0x0, 0x0) ftruncate(r0, 0x1000003) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x5, 0x0, 0x8, 0x0, 0x20}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) r3 = clone3(&(0x7f0000000740)={0x40092340, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500), {0x7}, &(0x7f00000008c0)=""/201, 0xc9, 0x0, &(0x7f0000000540)=[0x0, 0x0], 0x2, {r0}}, 0x58) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_pressure(r0, &(0x7f0000000640)='cpu.pressure\x00', 0x2, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000009c0)={0x480, 0x38, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@generic="916a44bba7d78b869b39c79ccf2883c8dc88c4e7db83a393321e65f64642725fb3f46575b111b3b2d9fa33", @nested={0x73, 0x4a, 0x0, 0x1, [@generic="34c03b755177182abce53ec15f7ecfcdca4baec070fdd94a81a72e707f9e5b3320a4c10044c307c2442b9f97f2eb9b0c7a9cad904fc7138b14be645c2ea498fbeb2cc5319c0ce943a76e4fe39de185289d87974a65a5f62fc43c46f674501cc979f43237afda6ff0edd88be441f049"]}, @generic="f17b78d1852e887b92d664992bfbb08cf0f214d533d67c8ed48e0dc485bb6d32d442138e8884287f0aa30e849df68a2c16aff114c192680bbf0bbd26215cc0683e06c071bc1e394b9dc18324c65c35204d5aa08a59a4e8ebb8f8574722b99b83ba1df9d94b3104078f", @typed={0x7, 0x1c, 0x0, 0x0, @str='^-\x00'}, @typed={0x14, 0x8, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @generic="42e3d8329435fe6e77826119b82e8aec39b43380fd2f21595785e08f0af077862ef99ff5a68945936ba60f2e308f0580869a38e2aa5ae25c13912875d85eaac74c35171d20330d79f5c9ceaa5360ac2a4592ce4affd3332ae8d9a646748dc79126b6b91f6af9bbf4eb799043966ca60796e4d388b7707643ec575ed1924d793c0e127ce31f7e8d5fc088ef37da99dc01040e9919ac159840f938", @typed={0x8, 0x1c, 0x0, 0x0, @fd=r1}, @typed={0x58, 0x72, 0x0, 0x0, @binary="c6b498d278d81a08712f114c23c9b12ce7bcbf857eca23757f37f6881f2544f809ead0425d3dcaf69fe98b9736509f532def01c4383c8fbbd10c980c99b99768b173613f58c88380d25a1fa8662604bcadaf2e37"}, @typed={0x8, 0x3e, 0x0, 0x0, @u32=0x3000}, @nested={0x241, 0x35, 0x0, 0x1, [@generic="2b44b81356567d68d12f4d2c6fee4aa2614ff5fcc7c80c98959ebf570d2444da4ed292f050e301e25e81546e1364fe8ee5c9b22342704eb388c133b2fab6a3f1f434fdc56a7037604dda79594f1e9a350596b1690e5928ff274f6262dff9d2fa7f239d41509927", @typed={0x3a, 0x39, 0x0, 0x0, @binary="e9ea48b5086990b379c621d57236db91659fea2b4f4a0e7812b36e04176120619b4301461705cdb444105df6535a7e83f9eca8e2d152"}, @typed={0x8, 0x3c, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x8a, 0x0, 0x0, @pid}, @generic="cd2b22a328bc318761b488ebbfd81a9065856050596e3352fe549b267a82c81aaefcc0a31dd5d5eb89499e0e528ae7466e911770035c312f419bfcf4ac3f192fac180d3bbcffa8bad57e26b858a2b42325665d27ae519fe1ec77766dd4d3281696175defcbf0757eb6bc70b5ebd876f04ce3aa1b8b37db45aee26bbb2cbe0a66deea936ee4005f4dcbc40b173704473bd25909ab76f3076eab5929eaea7667b7476e55f5a2fbc667c77ca936", @typed={0x8, 0x3e, 0x0, 0x0, @pid}, @typed={0x8, 0x90, 0x0, 0x0, @ipv4=@remote}, @generic="bc11d5f6e73fa8c99c36a2de31c64e78aca8b9a92d4479caadc9b5874b145b763a9a0294ba297fb92cf8b304009dbd57f6d49b0833f10d4c21631dcc57ae9d0d563498daa8438415a560164344b8b7404ff896ab440689be7384e5c4f276ff201e615161407aa56e6fb28164cbe551159a7e7e4fd5dda698ec363150b946be16211c79d3f8690865b3201ad1822492b007d3078cab67eb3229c1bed0dfda4c64d51e6e2eee7b0eb9a5b12269e364c9b7c68d4c1abcc03517bd77eb49f356", @typed={0x8, 0x7d, 0x0, 0x0, @pid=r3}, @typed={0x8, 0xe, 0x0, 0x0, @uid=r2}]}]}, 0x480}, 0x1, 0x0, 0x0, 0x20000000}, 0x24008040) r6 = dup2(r4, r5) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000400)={'wlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200005, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan0\x00'}) 22:33:57 executing program 6: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000280)='totmaps\x00') recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004700)={0x77359400}) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000004740)='devices.allow\x00', 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x60100, 0x0) readv(r3, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/65, 0x41}], 0x1) sendmsg$unix(r2, &(0x7f00000048c0)={&(0x7f0000000140)=@abs, 0x6e, 0x0}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x24508) mkdirat(r0, &(0x7f0000000080)='./mnt\x00', 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 22:33:57 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:57 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 22:33:57 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0xa000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:33:57 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 8) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2376.461806] FAULT_INJECTION: forcing a failure. [ 2376.461806] name failslab, interval 1, probability 0, space 0, times 0 [ 2376.463388] CPU: 1 PID: 11625 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2376.464237] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2376.465294] Call Trace: [ 2376.465628] dump_stack+0x107/0x167 [ 2376.466108] should_fail.cold+0x5/0xa [ 2376.466728] ? create_object.isra.0+0x3a/0xa20 [ 2376.467399] should_failslab+0x5/0x20 [ 2376.467838] kmem_cache_alloc+0x5b/0x310 [ 2376.468334] create_object.isra.0+0x3a/0xa20 [ 2376.468942] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2376.469799] kmem_cache_alloc_trace+0x151/0x320 [ 2376.470464] alloc_fs_context+0x57/0x840 [ 2376.470963] path_mount+0xaa3/0x2120 [ 2376.471411] ? strncpy_from_user+0x9e/0x470 [ 2376.471925] ? finish_automount+0xa90/0xa90 [ 2376.472447] ? getname_flags.part.0+0x1dd/0x4f0 [ 2376.473046] __x64_sys_mount+0x282/0x300 [ 2376.473550] ? copy_mnt_ns+0xa00/0xa00 [ 2376.474032] do_syscall_64+0x33/0x40 [ 2376.474499] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2376.475130] RIP: 0033:0x7f19cfd89b19 [ 2376.475587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2376.477821] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2376.478761] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2376.479702] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2376.480725] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2376.481830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2376.482857] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 [ 2376.490089] FAULT_INJECTION: forcing a failure. [ 2376.490089] name failslab, interval 1, probability 0, space 0, times 0 [ 2376.491612] CPU: 1 PID: 11629 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2376.492561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2376.493589] Call Trace: [ 2376.493905] dump_stack+0x107/0x167 [ 2376.494339] should_fail.cold+0x5/0xa [ 2376.494805] should_failslab+0x5/0x20 [ 2376.495270] __kmalloc_track_caller+0x79/0x370 [ 2376.495813] ? strndup_user+0x74/0xe0 [ 2376.496266] ? getname_flags.part.0+0x1dd/0x4f0 [ 2376.496827] memdup_user+0x22/0xd0 [ 2376.497270] strndup_user+0x74/0xe0 [ 2376.497712] __x64_sys_mount+0x133/0x300 [ 2376.498197] ? copy_mnt_ns+0xa00/0xa00 [ 2376.498671] do_syscall_64+0x33/0x40 [ 2376.499124] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2376.499743] RIP: 0033:0x7f71d816f04a [ 2376.500197] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2376.502441] RSP: 002b:00007f71d56e2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2376.503357] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71d816f04a [ 2376.504219] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2376.505097] RBP: 00007f71d56e3040 R08: 00007f71d56e3040 R09: 0000000020000040 [ 2376.505974] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2376.506841] R13: 00000000200000c0 R14: 00007f71d56e3000 R15: 0000000020000140 22:33:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 16) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:57 executing program 0: sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000001280)=ANY=[@ANYBLOB="01004783a74d95792a290000beb66133df5344f84c9bf37b7312ff03136747b2cb2610089d4514afb228b209d95a7e8fd636dd7a97a650899b71e7152eee230000000000000401dbf7214ac24ac3b7212feb02dec8d19d2f63340a8b8c0a3f23e110758e5ae9a4f06a0000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="ca281a34d35e0b5620ef58c3b42e0629db46"]) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000540)={&(0x7f0000000180)=ANY=[@ANYBLOB="2400000006060300000000000000000000000000050001000700000005000100070000002cb2e3dec11ce0487aa8d4be9a662e8a090299d1f107eac72ff12646f6824ca3526295c5b67180a7c33c5113c400199357850bc622ddbd88fd08379b8be287df5316e0fae9d9a1bc08c38a38a787a5e70fe56ea4e46a3cba1867a7467816d53a14c7f3926865a08d785b9a360e558c6e122c0379d26a6305da1c373d7a426f6dbfad68c5a6"], 0x24}}, 0x20000030) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140), 0xc, 0x0}, 0x4001) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = creat(&(0x7f0000000200)='./file0\x00', 0x3c) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000015c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x1c, r4, 0x200, 0x70bd2d, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000010) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r4, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x6}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000f00)={&(0x7f00000011c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="200027bd7000fedbdf25010000000000020008410000004c0018000000046985000000000000000000000000000000000000000000000000002d2cb9dd97100000000000000000000000000000000000000000000000000000000000000000000070056a1b5b5f9dc7f1f9cf49d0b08990383e6a824f742d2dd0a3d7216b9c96d6470a5b6e3569cc1bf8ddd3c2e73ff4eb56b6c9ec9fa612"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80)=[{{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/14, 0xe}, {&(0x7f0000001140)=""/105, 0x69}], 0x2}}, {{&(0x7f00000003c0), 0x6e, &(0x7f0000000880)=[{&(0x7f0000000500)=""/21, 0x15}, {&(0x7f0000000840)}], 0x2, &(0x7f00000008c0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000000940), 0x6e, &(0x7f00000010c0)=[{&(0x7f00000009c0)=""/189, 0xbd}, {&(0x7f0000000a80)=""/211, 0xd3}, {&(0x7f0000000b80)=""/133, 0x85}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000f80)=""/182, 0xb6}, {&(0x7f0000001040)=""/78, 0x4e}], 0x6, &(0x7f0000000c80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xc0}}], 0x3, 0x2100, &(0x7f0000000e40)) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xf7, 0x1, 0x40, 0x1, 0x0, 0xd7b, 0x21810, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x12042, 0x0, 0x1, 0x3, 0x6, 0x60e1fcbf, 0x8483, 0x0, 0xfffeffff}, r5, 0x7, 0xffffffffffffffff, 0x3) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1fc}}, 0x0) 22:33:57 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 4) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2376.540317] FAULT_INJECTION: forcing a failure. [ 2376.540317] name failslab, interval 1, probability 0, space 0, times 0 [ 2376.543307] CPU: 0 PID: 11630 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2376.544925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2376.546859] Call Trace: [ 2376.547474] dump_stack+0x107/0x167 [ 2376.548325] should_fail.cold+0x5/0xa [ 2376.549227] ? create_object.isra.0+0x3a/0xa20 [ 2376.550287] should_failslab+0x5/0x20 [ 2376.551170] kmem_cache_alloc+0x5b/0x310 [ 2376.552117] create_object.isra.0+0x3a/0xa20 [ 2376.553142] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2376.554324] kmem_cache_alloc_trace+0x151/0x320 [ 2376.555403] ? lockdep_init_map_type+0x2c7/0x780 [ 2376.556510] legacy_init_fs_context+0x44/0xe0 [ 2376.557556] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2376.558713] alloc_fs_context+0x4fd/0x840 [ 2376.559680] path_mount+0x962/0x2120 [ 2376.560343] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11636 comm=syz-executor.0 [ 2376.560550] ? strncpy_from_user+0x9e/0x470 [ 2376.562951] netlink: 468 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2376.564939] ? finish_automount+0xa90/0xa90 [ 2376.564960] ? getname_flags.part.0+0x1dd/0x4f0 [ 2376.564991] __x64_sys_mount+0x282/0x300 [ 2376.565009] ? copy_mnt_ns+0xa00/0xa00 [ 2376.565042] do_syscall_64+0x33/0x40 [ 2376.569312] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2376.569326] RIP: 0033:0x7f3bf065504a [ 2376.569346] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2376.569356] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2376.569378] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2376.569390] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2376.569401] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2376.569413] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2376.569424] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 22:33:57 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB, @ANYBLOB="7c9fdf0c234c23fd18304ec3a73702000000203d431d707a6b67aec2293d6f"], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{0x0, 0x8be9, 0x0, 0x0, 0x0, 0x6}, {0x800, 0x0, 0x400000000000000, 0xffffffffffffffff, 0x0, 0x4}]}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) flock(0xffffffffffffffff, 0x4) write(0xffffffffffffffff, &(0x7f0000000180)="dd8975d9d2eb389518e6d5ece8f722e079e9ec8f10122e84986aee763238801c2419", 0x22) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000010c0)='-*{^]%:\x00', &(0x7f0000001100)='./file1\x00', 0xffffffffffffffff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getdents64(r2, &(0x7f0000001400)=""/53, 0x35) lseek(r1, 0x2, 0x4) r3 = dup2(0xffffffffffffffff, r2) ioctl$AUTOFS_IOC_EXPIRE(r3, 0x810c9365, &(0x7f00000002c0)={{0x1, 0x20}, 0x100, './file0\x00'}) unshare(0x48020200) 22:33:57 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 5) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2376.693216] FAULT_INJECTION: forcing a failure. [ 2376.693216] name failslab, interval 1, probability 0, space 0, times 0 [ 2376.694572] CPU: 1 PID: 11644 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2376.695380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2376.696330] Call Trace: [ 2376.696637] dump_stack+0x107/0x167 [ 2376.697062] should_fail.cold+0x5/0xa [ 2376.697505] should_failslab+0x5/0x20 [ 2376.697954] __kmalloc_track_caller+0x79/0x370 [ 2376.698481] ? strndup_user+0x74/0xe0 [ 2376.698917] ? getname_flags.part.0+0x1dd/0x4f0 [ 2376.699449] memdup_user+0x22/0xd0 [ 2376.699853] strndup_user+0x74/0xe0 [ 2376.700275] __x64_sys_mount+0x133/0x300 [ 2376.700739] ? copy_mnt_ns+0xa00/0xa00 [ 2376.701203] do_syscall_64+0x33/0x40 [ 2376.701628] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2376.702220] RIP: 0033:0x7f71d816f04a [ 2376.702646] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:33:57 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xb000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:33:57 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 9) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2376.704773] RSP: 002b:00007f71d56e2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2376.705914] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71d816f04a [ 2376.706744] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2376.707573] RBP: 00007f71d56e3040 R08: 00007f71d56e3040 R09: 0000000020000040 [ 2376.708403] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2376.709231] R13: 00000000200000c0 R14: 00007f71d56e3000 R15: 0000000020000140 22:33:57 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0xb000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2376.765401] FAULT_INJECTION: forcing a failure. [ 2376.765401] name failslab, interval 1, probability 0, space 0, times 0 [ 2376.766953] CPU: 1 PID: 11651 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2376.767789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2376.768970] Call Trace: [ 2376.769297] dump_stack+0x107/0x167 [ 2376.769801] should_fail.cold+0x5/0xa [ 2376.770342] ? create_object.isra.0+0x3a/0xa20 [ 2376.771019] should_failslab+0x5/0x20 [ 2376.771480] kmem_cache_alloc+0x5b/0x310 [ 2376.771960] create_object.isra.0+0x3a/0xa20 [ 2376.772470] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2376.773074] kmem_cache_alloc_trace+0x151/0x320 [ 2376.773627] alloc_fs_context+0x57/0x840 [ 2376.774104] path_mount+0xaa3/0x2120 [ 2376.774550] ? strncpy_from_user+0x9e/0x470 [ 2376.775060] ? finish_automount+0xa90/0xa90 [ 2376.775560] ? getname_flags.part.0+0x1dd/0x4f0 [ 2376.776106] __x64_sys_mount+0x282/0x300 [ 2376.776578] ? copy_mnt_ns+0xa00/0xa00 [ 2376.777042] do_syscall_64+0x33/0x40 [ 2376.777478] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2376.778076] RIP: 0033:0x7f19cfd89b19 [ 2376.778509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2376.780665] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2376.781711] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2376.782541] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2376.783481] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2376.784314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2376.785152] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 [ 2376.790389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11653 comm=syz-executor.0 22:34:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 6) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:34:11 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) 22:34:11 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000002640)=[{&(0x7f0000000180)=""/143, 0x8f}, {&(0x7f00000002c0)=""/207, 0xcf}, {&(0x7f00000003c0)=""/207, 0xcf}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/163, 0xa3}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/171, 0xab}], 0x7, &(0x7f00000026c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}, 0x40000160) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000027c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0xff, 0x3, 0x1, 0x3}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mount(&(0x7f0000002800)=@sg0, &(0x7f0000002840)='./file0\x00', &(0x7f0000002880)='squashfs\x00', 0x2024081, &(0x7f00000028c0)='\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x0) 22:34:11 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:34:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x3) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r3, 0x100}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r4, 0x0) setresuid(0xffffffffffffffff, r4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r5, 0x0) setresuid(0xffffffffffffffff, r5, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x1f0, 0x2e, 0x1, 0x70bd26, 0x25dfdbfe, {0x13}, [@nested={0x18, 0x4e, 0x0, 0x1, [@typed={0x8, 0x7b, 0x0, 0x0, @uid=r4}, @typed={0xc, 0x57, 0x0, 0x0, @u64=0x1}]}, @nested={0xac, 0x4d, 0x0, 0x1, [@generic="d6c0b9276e5763b34d312f1bd8f3baccf0b9df3946bf7adf1de343f319e7d3cf", @typed={0x8, 0x59, 0x0, 0x0, @uid=r5}, @typed={0x14, 0x7f, 0x0, 0x0, @ipv6=@private0}, @typed={0x5f, 0xa, 0x0, 0x0, @binary="f4b91b0bf2245b1fd4c2d27f2a5405c3ff8d821aa81710a8a478122e597cb341abc282fcf6b01dce5c289edeab6c9d2ea55bf4e09b73d0a121108c878efc7fe14aa8a6299cd7ec143c751ecee2279a3692914d1920abc349700dcc"}, @typed={0xc, 0x5a, 0x0, 0x0, @u64=0x3a4}]}, @typed={0x14, 0x22, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @typed={0x14, 0x80, 0x0, 0x0, @ipv6=@mcast2}, @generic="5235c7d4ae30b90720288f18ab34db125e48e1230ea6f84d607f02ba29f9507ccb1f80b724c483569e42d10da68e2bfededd6b04effd1490421decda7477f074b94d7c0e085854ecf71e977287f550521d66182fb6db10f5d4ed7d830420cd5ee96b0ec7a20e0788d4d61678", @nested={0x36, 0x29, 0x0, 0x1, [@generic="2e4552aec7ea3ef27f30d3355e6ad49252527673ead451a82b5492842e9d123fd4d44d5dd34dc2fb52b1", @typed={0x8, 0x75, 0x0, 0x0, @u32=0x3}]}, @generic="e3a7d2b99a70e17674eb504ece6f93a94797e80040447b467839f056325ed1e1a49d5cdc1eb2b9afd8e09acde7cbcf37bff18e831a010678b6bb46bf734cedb1a4", @typed={0x8, 0x49, 0x0, 0x0, @ipv4=@remote}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008010) 22:34:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:34:11 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 1) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:34:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 17) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2390.702912] FAULT_INJECTION: forcing a failure. [ 2390.702912] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.704507] CPU: 0 PID: 11674 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2390.705407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.706456] Call Trace: [ 2390.706791] dump_stack+0x107/0x167 [ 2390.707252] should_fail.cold+0x5/0xa [ 2390.707735] should_failslab+0x5/0x20 [ 2390.708226] __kmalloc_track_caller+0x79/0x370 [ 2390.708807] ? match_number+0xaf/0x1d0 [ 2390.709307] kmemdup_nul+0x2d/0xa0 [ 2390.709763] match_number+0xaf/0x1d0 [ 2390.710236] ? match_u64+0x190/0x190 [ 2390.710704] ? list_lru_walk_node+0x209/0x2b0 [ 2390.711272] ? lock_downgrade+0x6d0/0x6d0 [ 2390.711806] tracefs_parse_options+0x36b/0x550 [ 2390.712402] ? tracefs_show_options+0x1e0/0x1e0 [ 2390.713013] ? get_nr_dirty_inodes+0x19e/0x220 [ 2390.713617] ? __sync_blockdev+0xbe/0xf0 [ 2390.714156] ? sync_filesystem.part.0+0x191/0x1f0 [ 2390.714781] tracefs_remount+0x48/0x90 [ 2390.715293] ? tracefs_apply_options.isra.0+0x950/0x950 [ 2390.715969] legacy_reconfigure+0x11b/0x190 [ 2390.716538] reconfigure_super+0x414/0x9c0 [ 2390.717093] ? fs_umode_to_dtype+0xb0/0xb0 [ 2390.717649] path_mount+0x1ae0/0x2120 [ 2390.718154] ? strncpy_from_user+0x9e/0x470 [ 2390.718715] ? finish_automount+0xa90/0xa90 [ 2390.719262] ? getname_flags.part.0+0x1dd/0x4f0 [ 2390.719876] __x64_sys_mount+0x282/0x300 [ 2390.720398] ? copy_mnt_ns+0xa00/0xa00 [ 2390.720894] do_syscall_64+0x33/0x40 [ 2390.721369] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2390.722016] RIP: 0033:0x7f3bf065504a [ 2390.722494] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.724813] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2390.725769] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2390.726673] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2390.727581] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2390.728491] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2390.729415] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 [ 2390.754696] audit: type=1326 audit(1736289251.893:15): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 [ 2390.755792] FAULT_INJECTION: forcing a failure. [ 2390.755792] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.761181] CPU: 0 PID: 11682 Comm: syz-executor.7 Not tainted 5.10.232 #1 [ 2390.762041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.762126] audit: type=1326 audit(1736289251.893:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 [ 2390.763072] Call Trace: [ 2390.763085] dump_stack+0x107/0x167 [ 2390.763097] should_fail.cold+0x5/0xa [ 2390.763108] ? getname_flags.part.0+0x50/0x4f0 [ 2390.763128] should_failslab+0x5/0x20 [ 2390.770038] kmem_cache_alloc+0x5b/0x310 [ 2390.770535] getname_flags.part.0+0x50/0x4f0 [ 2390.771064] getname_flags+0x9a/0xe0 [ 2390.771528] do_mkdirat+0x8f/0x2b0 [ 2390.771970] ? user_path_create+0xf0/0xf0 [ 2390.772485] do_syscall_64+0x33/0x40 [ 2390.772943] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2390.773577] RIP: 0033:0x7f3dc910fc27 [ 2390.774041] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.776313] RSP: 002b:00007f3dc6685fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2390.777237] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3dc910fc27 [ 2390.778093] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2390.778956] RBP: 00007f3dc6686040 R08: 0000000000000000 R09: 0000000000020020 [ 2390.779829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2390.780698] R13: 00000000200000c0 R14: 00007f3dc6686000 R15: 0000000020000140 [ 2390.788003] FAULT_INJECTION: forcing a failure. [ 2390.788003] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.790706] CPU: 1 PID: 11684 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2390.792257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.794086] Call Trace: [ 2390.794671] dump_stack+0x107/0x167 [ 2390.795478] should_fail.cold+0x5/0xa [ 2390.796329] ? create_object.isra.0+0x3a/0xa20 [ 2390.797363] should_failslab+0x5/0x20 [ 2390.798217] kmem_cache_alloc+0x5b/0x310 [ 2390.799132] create_object.isra.0+0x3a/0xa20 [ 2390.800111] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2390.801253] kmem_cache_alloc_trace+0x151/0x320 [ 2390.802287] ? lockdep_init_map_type+0x2c7/0x780 [ 2390.802807] audit: type=1326 audit(1736289251.921:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=47 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 [ 2390.803361] legacy_init_fs_context+0x44/0xe0 [ 2390.803385] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2390.807988] alloc_fs_context+0x4fd/0x840 [ 2390.808923] path_mount+0xaa3/0x2120 [ 2390.809077] audit: type=1326 audit(1736289251.921:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 [ 2390.809764] ? strncpy_from_user+0x9e/0x470 [ 2390.809785] ? finish_automount+0xa90/0xa90 [ 2390.814188] ? getname_flags.part.0+0x1dd/0x4f0 [ 2390.815241] __x64_sys_mount+0x282/0x300 [ 2390.816145] ? copy_mnt_ns+0xa00/0xa00 [ 2390.817033] do_syscall_64+0x33/0x40 [ 2390.817866] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2390.819002] RIP: 0033:0x7f19cfd89b19 [ 2390.819829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.822633] audit: type=1326 audit(1736289251.921:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 [ 2390.823961] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2390.823983] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2390.823999] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2390.831348] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2390.832946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2390.834551] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 [ 2390.836961] FAULT_INJECTION: forcing a failure. [ 2390.836961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2390.838465] CPU: 0 PID: 11683 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2390.839267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.840229] Call Trace: [ 2390.840537] dump_stack+0x107/0x167 [ 2390.840960] should_fail.cold+0x5/0xa [ 2390.841413] _copy_from_user+0x2e/0x1b0 [ 2390.841875] memdup_user+0x65/0xd0 [ 2390.842287] strndup_user+0x74/0xe0 [ 2390.842710] __x64_sys_mount+0x133/0x300 [ 2390.843181] ? copy_mnt_ns+0xa00/0xa00 [ 2390.843640] do_syscall_64+0x33/0x40 [ 2390.844080] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2390.844672] RIP: 0033:0x7f71d816f04a [ 2390.845106] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.847427] RSP: 002b:00007f71d56e2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2390.848337] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71d816f04a [ 2390.849187] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2390.850068] RBP: 00007f71d56e3040 R08: 00007f71d56e3040 R09: 0000000020000040 [ 2390.850949] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2390.851836] R13: 00000000200000c0 R14: 00007f71d56e3000 R15: 0000000020000140 [ 2390.854521] audit: type=1326 audit(1736289251.992:20): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 [ 2390.857158] audit: type=1326 audit(1736289251.992:21): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 [ 2390.860203] audit: type=1326 audit(1736289251.992:22): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 22:34:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 18) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2390.869303] audit: type=1326 audit(1736289252.005:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 [ 2390.878096] audit: type=1326 audit(1736289252.005:24): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11672 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63c91c8b19 code=0x7ffc0000 22:34:12 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 2) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2390.929383] FAULT_INJECTION: forcing a failure. [ 2390.929383] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.932105] CPU: 1 PID: 11693 Comm: syz-executor.3 Not tainted 5.10.232 #1 [ 2390.933701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.935628] Call Trace: [ 2390.936221] dump_stack+0x107/0x167 [ 2390.937058] should_fail.cold+0x5/0xa [ 2390.937948] ? create_object.isra.0+0x3a/0xa20 [ 2390.938998] should_failslab+0x5/0x20 [ 2390.939873] kmem_cache_alloc+0x5b/0x310 [ 2390.940809] create_object.isra.0+0x3a/0xa20 [ 2390.941815] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2390.942971] __kmalloc_track_caller+0x177/0x370 [ 2390.944039] ? match_number+0xaf/0x1d0 [ 2390.944943] kmemdup_nul+0x2d/0xa0 [ 2390.945753] match_number+0xaf/0x1d0 [ 2390.946606] ? match_u64+0x190/0x190 [ 2390.947462] ? list_lru_walk_node+0x209/0x2b0 [ 2390.948497] ? lock_downgrade+0x6d0/0x6d0 [ 2390.949467] tracefs_parse_options+0x36b/0x550 [ 2390.950524] ? tracefs_show_options+0x1e0/0x1e0 [ 2390.951567] ? get_nr_dirty_inodes+0x19e/0x220 [ 2390.952584] ? __sync_blockdev+0xbe/0xf0 [ 2390.953501] ? sync_filesystem.part.0+0x191/0x1f0 [ 2390.954587] tracefs_remount+0x48/0x90 [ 2390.955452] ? tracefs_apply_options.isra.0+0x950/0x950 [ 2390.956676] legacy_reconfigure+0x11b/0x190 [ 2390.957677] reconfigure_super+0x414/0x9c0 [ 2390.958647] ? fs_umode_to_dtype+0xb0/0xb0 [ 2390.959601] path_mount+0x1ae0/0x2120 [ 2390.960483] ? strncpy_from_user+0x9e/0x470 [ 2390.961479] ? finish_automount+0xa90/0xa90 [ 2390.962442] ? getname_flags.part.0+0x1dd/0x4f0 [ 2390.963503] __x64_sys_mount+0x282/0x300 [ 2390.964434] ? copy_mnt_ns+0xa00/0xa00 [ 2390.965349] do_syscall_64+0x33/0x40 [ 2390.966204] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2390.967378] RIP: 0033:0x7f3bf065504a [ 2390.968216] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.972420] RSP: 002b:00007f3bedbc8fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2390.974172] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3bf065504a [ 2390.975810] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2390.977462] RBP: 00007f3bedbc9040 R08: 00007f3bedbc9040 R09: 0000000020000040 [ 2390.979099] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2390.980721] R13: 00000000200000c0 R14: 00007f3bedbc9000 R15: 0000000020000140 [ 2391.000628] FAULT_INJECTION: forcing a failure. [ 2391.000628] name failslab, interval 1, probability 0, space 0, times 0 [ 2391.003320] CPU: 1 PID: 11702 Comm: syz-executor.7 Not tainted 5.10.232 #1 [ 2391.004907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2391.006818] Call Trace: [ 2391.007429] dump_stack+0x107/0x167 [ 2391.008274] should_fail.cold+0x5/0xa [ 2391.009151] ? create_object.isra.0+0x3a/0xa20 [ 2391.010208] should_failslab+0x5/0x20 [ 2391.011086] kmem_cache_alloc+0x5b/0x310 [ 2391.012017] ? ksys_write+0x21a/0x260 [ 2391.012895] create_object.isra.0+0x3a/0xa20 [ 2391.013917] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2391.015087] kmem_cache_alloc+0x159/0x310 [ 2391.016045] getname_flags.part.0+0x50/0x4f0 [ 2391.017063] getname_flags+0x9a/0xe0 [ 2391.017928] do_mkdirat+0x8f/0x2b0 [ 2391.018747] ? user_path_create+0xf0/0xf0 [ 2391.019716] do_syscall_64+0x33/0x40 [ 2391.020572] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2391.021756] RIP: 0033:0x7f3dc910fc27 [ 2391.022609] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2391.026841] RSP: 002b:00007f3dc6664fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2391.028592] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3dc910fc27 [ 2391.030246] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2391.031891] RBP: 00007f3dc6665040 R08: 0000000000000000 R09: 0000000000020020 [ 2391.033489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 2391.035107] R13: 00000000200000c0 R14: 00007f3dc6665000 R15: 0000000020000140 22:34:12 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) (fail_nth: 11) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r2, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:34:12 executing program 0: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[]) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x88001) unlinkat(r0, &(0x7f00000000c0)='./file1\x00', 0x200) 22:34:12 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x18000000, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 22:34:12 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd_index=0x1, 0xffff, 0x0, 0x20}, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd=r0, 0x0, 0x0, 0x4, 0x0, 0xac1ad8587519bbf7, {0x0, r1}}, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000480)={&(0x7f0000000200)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000140)=""/23, 0x17}, 0x40012142) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x80100, 0xb8f, 0x8001}) sendmsg$nl_generic(r0, 0x0, 0x40010) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x100) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)={0x10000, 0x0, 0x100000001, 0x0, 0x0, 0xfffe}) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) getsockopt$sock_buf(r5, 0x1, 0x1a, &(0x7f00000000c0)=""/244, &(0x7f00000001c0)=0xf4) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000340)=ANY=[@ANYRES64, @ANYRES32=r4, @ANYRESOCT=r3]) 22:34:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 7) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2391.100560] FAULT_INJECTION: forcing a failure. 22:34:12 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x18000000, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) fcntl$dupfd(r1, 0x406, r0) [ 2391.100560] name failslab, interval 1, probability 0, space 0, times 0 [ 2391.103571] CPU: 1 PID: 11711 Comm: syz-executor.1 Not tainted 5.10.232 #1 [ 2391.105136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2391.107004] Call Trace: [ 2391.107602] dump_stack+0x107/0x167 [ 2391.108428] should_fail.cold+0x5/0xa [ 2391.109299] ? legacy_init_fs_context+0x44/0xe0 [ 2391.110358] should_failslab+0x5/0x20 [ 2391.111215] kmem_cache_alloc_trace+0x55/0x320 [ 2391.112242] ? lockdep_init_map_type+0x2c7/0x780 [ 2391.112650] FAULT_INJECTION: forcing a failure. [ 2391.112650] name failslab, interval 1, probability 0, space 0, times 0 [ 2391.113328] legacy_init_fs_context+0x44/0xe0 [ 2391.113354] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2391.116725] alloc_fs_context+0x4fd/0x840 [ 2391.117665] path_mount+0xaa3/0x2120 [ 2391.118511] ? strncpy_from_user+0x9e/0x470 [ 2391.119487] ? finish_automount+0xa90/0xa90 [ 2391.120465] ? getname_flags.part.0+0x1dd/0x4f0 [ 2391.121536] __x64_sys_mount+0x282/0x300 [ 2391.122453] ? copy_mnt_ns+0xa00/0xa00 [ 2391.123353] do_syscall_64+0x33/0x40 [ 2391.124191] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2391.125346] RIP: 0033:0x7f19cfd89b19 [ 2391.126186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2391.130354] RSP: 002b:00007f19cd2ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2391.132066] RAX: ffffffffffffffda RBX: 00007f19cfe9cf60 RCX: 00007f19cfd89b19 [ 2391.133674] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2391.135270] RBP: 00007f19cd2ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2391.136888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2391.138512] R13: 00007fff275ab86f R14: 00007f19cd2ff300 R15: 0000000000022000 [ 2391.140153] CPU: 0 PID: 11713 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2391.140944] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2391.141883] Call Trace: [ 2391.142185] dump_stack+0x107/0x167 [ 2391.142611] should_fail.cold+0x5/0xa [ 2391.143044] ? copy_mount_options+0x55/0x180 [ 2391.143545] should_failslab+0x5/0x20 [ 2391.144001] kmem_cache_alloc_trace+0x55/0x320 [ 2391.144523] ? _copy_from_user+0xfb/0x1b0 [ 2391.145001] copy_mount_options+0x55/0x180 [ 2391.145502] __x64_sys_mount+0x1a8/0x300 [ 2391.145966] ? copy_mnt_ns+0xa00/0xa00 [ 2391.146416] do_syscall_64+0x33/0x40 [ 2391.146844] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2391.147427] RIP: 0033:0x7f71d816f04a [ 2391.147853] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2391.149963] RSP: 002b:00007f71d56e2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2391.150829] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71d816f04a [ 2391.151649] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2391.152459] RBP: 00007f71d56e3040 R08: 00007f71d56e3040 R09: 0000000020000040 [ 2391.153276] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2391.154091] R13: 00000000200000c0 R14: 00007f71d56e3000 R15: 0000000020000140 22:34:12 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x10001, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r3, 0x1}, 0x14}}, 0x0) bind$netlink(r2, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbf7, 0x2000000}, 0xfffffffffffffe51) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendfile(r0, r4, 0x0, 0x20d315) 22:34:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x3c15, 0x7aa5, 0x1, &(0x7f0000000200)={[0x1ff]}, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) (fail_nth: 8) r3 = openat(r2, &(0x7f0000000180)='./file0/file0\x00', 0x2140, 0xd0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) getdents(r4, &(0x7f0000000240)=""/62, 0x3e) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0xa, 0x1, 0x80, 0x0, 0x3, 0x308a4, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0x5}, 0x44443, 0x2, 0x75, 0x6, 0xec5, 0x80, 0x6, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x2, r3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) [ 2391.268873] FAULT_INJECTION: forcing a failure. [ 2391.268873] name failslab, interval 1, probability 0, space 0, times 0 [ 2391.270329] CPU: 0 PID: 11723 Comm: syz-executor.5 Not tainted 5.10.232 #1 [ 2391.271119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2391.272062] Call Trace: [ 2391.272368] dump_stack+0x107/0x167 [ 2391.272780] should_fail.cold+0x5/0xa [ 2391.273215] ? create_object.isra.0+0x3a/0xa20 [ 2391.273740] should_failslab+0x5/0x20 [ 2391.274178] kmem_cache_alloc+0x5b/0x310 [ 2391.274643] create_object.isra.0+0x3a/0xa20 [ 2391.275137] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2391.275712] kmem_cache_alloc_trace+0x151/0x320 [ 2391.276240] ? _copy_from_user+0xfb/0x1b0 [ 2391.276715] copy_mount_options+0x55/0x180 [ 2391.277193] __x64_sys_mount+0x1a8/0x300 [ 2391.277789] ? copy_mnt_ns+0xa00/0xa00 [ 2391.278304] do_syscall_64+0x33/0x40 [ 2391.278732] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2391.279313] RIP: 0033:0x7f71d816f04a [ 2391.279733] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2391.281821] RSP: 002b:00007f71d56e2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2391.282687] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71d816f04a [ 2391.283497] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2391.284304] RBP: 00007f71d56e3040 R08: 00007f71d56e3040 R09: 0000000020000040 [ 2391.285118] R10: 0000000000020020 R11: 0000000000000206 R12: 0000000020000040 [ 2391.285937] R13: 00000000200000c0 R14: 00007f71d56e3000 R15: 0000000020000140 [ 2391.298747] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2391.672811] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2393.244673] syz-executor.6: page allocation failure: order:0, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz6,mems_allowed=0 [ 2393.246410] CPU: 1 PID: 11708 Comm: syz-executor.6 Not tainted 5.10.232 #1 [ 2393.247240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2393.248232] Call Trace: [ 2393.248548] dump_stack+0x107/0x167 [ 2393.248980] warn_alloc.cold+0x95/0x18a [ 2393.249461] ? zone_watermark_ok_safe+0x260/0x260 [ 2393.250047] ? queue_oom_reaper+0x86/0x1e0 [ 2393.250558] ? wait_for_completion_io+0x270/0x270 [ 2393.251127] __alloc_pages_slowpath.constprop.0+0x1c33/0x2170 [ 2393.251824] ? lock_acquire+0x167/0x470 [ 2393.252289] ? warn_alloc+0x190/0x190 [ 2393.252754] __alloc_pages_nodemask+0x51d/0x600 [ 2393.253302] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2393.253958] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2393.254664] ? policy_node+0xab/0x140 [ 2393.255126] ? __sanitizer_cov_trace_pc+0x4c/0x60 [ 2393.255696] alloc_pages_current+0x187/0x280 [ 2393.256212] ? alloc_pages_current+0x2/0x280 [ 2393.256730] relay_open_buf.part.0+0x2a5/0xc00 [ 2393.257273] relay_open+0x531/0xa10 [ 2393.257715] do_blk_trace_setup+0x4cf/0xc10 [ 2393.258236] ? _copy_from_user+0xfb/0x1b0 [ 2393.258571] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 2393.258727] __blk_trace_setup+0xca/0x180 [ 2393.258782] ? do_blk_trace_setup+0xc10/0xc10 [ 2393.258808] blk_trace_ioctl+0x155/0x290 [ 2393.261599] ? blk_add_trace_bio_remap+0x5d0/0x5d0 [ 2393.262178] ? do_vfs_ioctl+0x283/0x10d0 [ 2393.262655] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2393.263272] ? generic_block_fiemap+0x60/0x60 [ 2393.263795] ? lock_downgrade+0x6d0/0x6d0 [ 2393.264293] blkdev_ioctl+0xc1/0x710 [ 2393.264731] ? blkdev_common_ioctl+0x1930/0x1930 [ 2393.265286] ? selinux_file_ioctl+0xb6/0x270 [ 2393.265824] block_ioctl+0xf9/0x140 [ 2393.266252] ? blkdev_read_iter+0x1c0/0x1c0 [ 2393.266759] __x64_sys_ioctl+0x19a/0x210 [ 2393.267241] do_syscall_64+0x33/0x40 [ 2393.267676] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2393.268280] RIP: 0033:0x7f63c91c8b19 [ 2393.268734] Code: Unable to access opcode bytes at RIP 0x7f63c91c8aef. [ 2393.269508] RSP: 002b:00007f63c673e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2393.270404] RAX: ffffffffffffffda RBX: 00007f63c92dbf60 RCX: 00007f63c91c8b19 [ 2393.271246] RDX: 0000000020000000 RSI: 00000000c0481273 RDI: 0000000000000003 [ 2393.272080] RBP: 00007f63c9222f6d R08: 0000000000000000 R09: 0000000000000000 [ 2393.272917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2393.273777] R13: 00007ffcad79266f R14: 00007f63c673e300 R15: 0000000000022000 [ 2393.274636] CPU: 0 PID: 103 Comm: systemd-journal Not tainted 5.10.232 #1 [ 2393.275429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2393.275525] Mem-Info: [ 2393.276372] Call Trace: [ 2393.276390] dump_stack+0x107/0x167 [ 2393.276403] dump_header+0x106/0x655 [ 2393.276416] oom_kill_process.cold+0x10/0x15 [ 2393.276430] out_of_memory+0x1149/0x1440 [ 2393.276446] ? oom_killer_disable+0x280/0x280 [ 2393.276461] ? mutex_trylock+0x237/0x2b0 [ 2393.276471] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2393.276485] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2393.276784] active_anon:19586 inactive_anon:59916 isolated_anon:0 [ 2393.276784] active_file:9 inactive_file:30 isolated_file:0 [ 2393.276784] unevictable:0 dirty:0 writeback:0 [ 2393.276784] slab_reclaimable:8473 slab_unreclaimable:61861 [ 2393.276784] mapped:69654 shmem:122 pagetables:1657 bounce:0 [ 2393.276784] free:2331 free_pcp:62 free_cma:0 [ 2393.277076] ? lock_acquire+0x167/0x470 [ 2393.277091] ? warn_alloc+0x190/0x190 [ 2393.277521] Node 0 active_anon:78344kB inactive_anon:239664kB active_file:36kB inactive_file:120kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278616kB dirty:0kB writeback:0kB shmem:488kB writeback_tmp:0kB kernel_stack:4512kB all_unreclaimable? yes [ 2393.277948] __alloc_pages_nodemask+0x51d/0x600 [ 2393.278450] Node 0 [ 2393.278901] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2393.279437] DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2393.279873] ? find_get_entry+0x2c8/0x740 [ 2393.280554] lowmem_reserve[]: [ 2393.281216] alloc_pages_current+0x187/0x280 [ 2393.281230] __page_cache_alloc+0x2d2/0x360 [ 2393.284820] 0 [ 2393.285265] pagecache_get_page+0x2c7/0xc80 [ 2393.285280] filemap_fault+0x177d/0x2210 [ 2393.285716] 1616 [ 2393.288363] ? read_cache_page_gfp+0x30/0x30 [ 2393.288377] ? replace_page_cache_page+0x1200/0x1200 [ 2393.288903] 1616 [ 2393.289171] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2393.289187] ext4_filemap_fault+0x87/0xc0 [ 2393.289886] 1616 [ 2393.292759] __do_fault+0x113/0x410 [ 2393.292777] handle_mm_fault+0x1e53/0x3500 [ 2393.293262] [ 2393.293617] ? __pmd_alloc+0x5e0/0x5e0 [ 2393.294124] Node 0 [ 2393.294609] ? vmacache_find+0x55/0x2a0 [ 2393.294828] DMA32 free:2836kB min:9212kB low:10864kB high:12516kB reserved_highatomic:0KB active_anon:78344kB inactive_anon:239664kB active_file:204kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:6628kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 2393.295301] ? vmacache_update+0xce/0x140 [ 2393.295319] do_user_addr_fault+0x56e/0xc60 [ 2393.295771] lowmem_reserve[]: [ 2393.296019] exc_page_fault+0xa2/0x1a0 [ 2393.296032] ? asm_exc_page_fault+0x8/0x30 [ 2393.296532] 0 [ 2393.297110] asm_exc_page_fault+0x1e/0x30 [ 2393.297118] RIP: 0033:0x7ffbc7682116 [ 2393.297131] Code: Unable to access opcode bytes at RIP 0x7ffbc76820ec. [ 2393.297374] 0 [ 2393.297965] RSP: 002b:00007ffc838c3950 EFLAGS: 00010293 [ 2393.298462] 0 [ 2393.298687] RAX: 0000000000000001 RBX: 0000557f19b18360 RCX: 00007ffbc7682116 [ 2393.298697] RDX: 0000000000000014 RSI: 0000557f19b1e8e0 RDI: 0000000000000008 [ 2393.299128] 0 [ 2393.299595] RBP: ffffffffffffffff R08: 0000000000000000 R09: 00007ffc838cc080 [ 2393.299604] R10: 00000000ffffffff R11: 0000000000000293 R12: 0000000000000001 [ 2393.299796] [ 2393.300234] R13: 0000000000000014 R14: 0000000000000000 R15: 0000000000000000 [ 2393.300298] Mem-Info: [ 2393.300508] Node 0 [ 2393.300975] active_anon:19586 inactive_anon:59916 isolated_anon:0 [ 2393.300975] active_file:9 inactive_file:30 isolated_file:0 [ 2393.300975] unevictable:0 dirty:0 writeback:0 [ 2393.300975] slab_reclaimable:8473 slab_unreclaimable:61861 [ 2393.300975] mapped:69654 shmem:122 pagetables:1657 bounce:0 [ 2393.300975] free:2331 free_pcp:62 free_cma:0 [ 2393.304175] DMA: [ 2393.304655] Node 0 active_anon:78344kB inactive_anon:239664kB active_file:36kB inactive_file:120kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278616kB dirty:0kB writeback:0kB shmem:488kB writeback_tmp:0kB kernel_stack:4512kB all_unreclaimable? yes [ 2393.305157] 0*4kB [ 2393.305518] Node 0 [ 2393.305953] 1*8kB (U) [ 2393.306464] DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2393.306470] lowmem_reserve[]: [ 2393.306682] 1*16kB [ 2393.307161] 0 1616 [ 2393.307587] (U) 0*32kB [ 2393.308362] 1616 [ 2393.308571] 1*64kB [ 2393.309189] 1616 [ 2393.309410] (U) [ 2393.310237] Node 0 DMA32 free:2836kB min:9212kB low:10864kB high:12516kB reserved_highatomic:0KB active_anon:78344kB inactive_anon:239664kB active_file:204kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:6628kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 2393.311071] 0*128kB [ 2393.311274] lowmem_reserve[]: 0 [ 2393.312119] 1*256kB [ 2393.312938] 0 [ 2393.313145] (U) [ 2393.313964] 0 [ 2393.314256] 0*512kB [ 2393.314508] 0 [ 2393.318096] 0*1024kB [ 2393.318333] Node 0 [ 2393.320996] 1*2048kB (M) [ 2393.321247] DMA: 0*4kB [ 2393.321515] 1*4096kB (M) [ 2393.321806] 1*8kB (U) [ 2393.324698] = 6488kB [ 2393.325063] 1*16kB (U) [ 2393.325324] Node 0 DMA32: [ 2393.325589] 0*32kB 1*64kB [ 2393.325887] 430*4kB [ 2393.326135] (U) 0*128kB [ 2393.326397] (UM) [ 2393.326630] 1*256kB (U) [ 2393.326858] 84*8kB (UM) [ 2393.330117] 0*512kB 0*1024kB [ 2393.330387] 12*16kB (UM) [ 2393.330763] 1*2048kB (M) [ 2393.331053] 0*32kB 0*64kB [ 2393.331268] 1*4096kB [ 2393.331492] 0*128kB 0*256kB [ 2393.331699] (M) = 6488kB [ 2393.331968] 0*512kB 0*1024kB [ 2393.332205] Node 0 [ 2393.332463] 0*2048kB [ 2393.332715] DMA32: 430*4kB [ 2393.333050] 0*4096kB [ 2393.333343] (UM) [ 2393.333660] = 2584kB [ 2393.333671] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2393.333950] 84*8kB (UM) [ 2393.334247] 151 total pagecache pages [ 2393.334541] 12*16kB [ 2393.334862] 0 pages in swap cache [ 2393.335199] (UM) 0*32kB [ 2393.335475] Swap cache stats: add 0, delete 0, find 0/0 [ 2393.335774] 0*64kB 0*128kB [ 2393.336032] Free swap = 0kB [ 2393.336337] 0*256kB [ 2393.336639] Total swap = 0kB [ 2393.336645] 524158 pages RAM [ 2393.337011] 0*512kB 0*1024kB [ 2393.337330] 0 pages HighMem/MovableOnly [ 2393.337337] 105067 pages reserved [ 2393.337656] 0*2048kB 0*4096kB = 2584kB [ 2393.347516] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2393.348502] 151 total pagecache pages [ 2393.348937] 0 pages in swap cache [ 2393.349347] Swap cache stats: add 0, delete 0, find 0/0 [ 2393.349955] Free swap = 0kB [ 2393.350319] Total swap = 0kB [ 2393.350665] 524158 pages RAM [ 2393.351025] 0 pages HighMem/MovableOnly [ 2393.351474] 105067 pages reserved [ 2393.351867] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=103,uid=0 [ 2393.354264] Out of memory (oom_kill_allocating_task): Killed process 103 (systemd-journal) total-vm:31836kB, anon-rss:996kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:88kB oom_score_adj:-250 [ 2393.405171] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 2393.407266] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 2393.421798] systemd[1]: systemd-journald.service: Consumed 6.289s CPU time. [ 2393.427820] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 2393.446836] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 2393.558761] systemd[1]: systemd-journal-flush.service: Succeeded. [ 2393.565231] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 2393.566578] systemd[1]: Stopped Journal Service. [ 2393.568644] systemd[1]: systemd-journald.service: Consumed 6.289s CPU time. [ 2393.622243] systemd[1]: Starting Journal Service... [ 2393.638488] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2393.639638] CPU: 1 PID: 6603 Comm: syz-fuzzer Not tainted 5.10.232 #1 [ 2393.640383] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2393.641327] Call Trace: [ 2393.641683] dump_stack+0x107/0x167 [ 2393.642103] dump_header+0x106/0x655 [ 2393.642532] oom_kill_process.cold+0x10/0x15 [ 2393.643041] out_of_memory+0x1149/0x1440 [ 2393.643514] ? oom_killer_disable+0x280/0x280 [ 2393.644029] ? mutex_trylock+0x237/0x2b0 [ 2393.644491] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2393.645169] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2393.645849] ? lock_acquire+0x167/0x470 [ 2393.646303] ? warn_alloc+0x190/0x190 [ 2393.646752] __alloc_pages_nodemask+0x51d/0x600 [ 2393.647281] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2393.647977] ? find_get_entry+0x2c8/0x740 [ 2393.648458] alloc_pages_current+0x187/0x280 [ 2393.648959] __page_cache_alloc+0x2d2/0x360 [ 2393.649460] pagecache_get_page+0x2c7/0xc80 [ 2393.649955] filemap_fault+0x177d/0x2210 [ 2393.650421] ? read_cache_page_gfp+0x30/0x30 [ 2393.650923] ? handle_mm_fault+0x28b1/0x3500 [ 2393.651419] ? lock_downgrade+0x6d0/0x6d0 [ 2393.651894] ext4_filemap_fault+0x87/0xc0 [ 2393.652365] __do_fault+0x113/0x410 [ 2393.652785] handle_mm_fault+0x1e53/0x3500 [ 2393.653267] ? find_held_lock+0x2c/0x110 [ 2393.653738] ? __pmd_alloc+0x5e0/0x5e0 [ 2393.654194] ? vmacache_find+0x55/0x2a0 [ 2393.654644] ? vmacache_update+0xce/0x140 [ 2393.655116] do_user_addr_fault+0x56e/0xc60 [ 2393.655612] exc_page_fault+0xa2/0x1a0 [ 2393.656053] ? asm_exc_page_fault+0x8/0x30 [ 2393.656529] asm_exc_page_fault+0x1e/0x30 [ 2393.656995] RIP: 0033:0x417360 [ 2393.657362] Code: Unable to access opcode bytes at RIP 0x417336. [ 2393.658059] RSP: 002b:000000c00a49be08 EFLAGS: 00010202 [ 2393.658662] RAX: 00007fb055fc77d0 RBX: 000000c000020800 RCX: 000000c000740380 [ 2393.659483] RDX: 000000c000020800 RSI: 0000000000000080 RDI: 000000c0007404c8 [ 2393.660294] RBP: 000000c00a49be18 R08: 0000000000000000 R09: 0000000000000000 [ 2393.661107] R10: 0000000000000000 R11: 0000000000000286 R12: 0000000000000003 [ 2393.661932] R13: 000000c0006a4300 R14: 0000023854b502b5 R15: 0000000000000000 [ 2393.662788] Mem-Info: [ 2393.663106] active_anon:19586 inactive_anon:59685 isolated_anon:21 [ 2393.663106] active_file:713 inactive_file:562 isolated_file:0 [ 2393.663106] unevictable:0 dirty:0 writeback:0 [ 2393.663106] slab_reclaimable:8473 slab_unreclaimable:60881 [ 2393.663106] mapped:70767 shmem:122 pagetables:1657 bounce:0 [ 2393.663106] free:3779 free_pcp:76 free_cma:0 [ 2393.666703] Node 0 active_anon:78344kB inactive_anon:238740kB active_file:2704kB inactive_file:2332kB unevictable:0kB isolated(anon):84kB isolated(file):4kB mapped:282984kB dirty:0kB writeback:0kB shmem:488kB writeback_tmp:0kB kernel_stack:4448kB all_unreclaimable? no [ 2393.669380] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2393.673290] lowmem_reserve[]: 0 1616 1616 1616 [ 2393.673840] Node 0 DMA32 free:9136kB min:17744kB low:19396kB high:21048kB reserved_highatomic:0KB active_anon:78344kB inactive_anon:238236kB active_file:2948kB inactive_file:2044kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:6628kB bounce:0kB free_pcp:348kB local_pcp:0kB free_cma:0kB [ 2393.677294] lowmem_reserve[]: 0 0 0 0 [ 2393.677764] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2393.679315] Node 0 DMA32: 674*4kB (M) 367*8kB (M) 154*16kB (UM) 28*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8992kB [ 2393.680917] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2393.681895] 1222 total pagecache pages [ 2393.682349] 0 pages in swap cache [ 2393.682742] Swap cache stats: add 0, delete 0, find 0/0 [ 2393.683355] Free swap = 0kB [ 2393.683697] Total swap = 0kB [ 2393.684060] 524158 pages RAM [ 2393.684405] 0 pages HighMem/MovableOnly [ 2393.684855] 105067 pages reserved [ 2393.685269] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=6603,uid=0 [ 2393.687565] Out of memory (oom_kill_allocating_task): Killed process 254 (syz-fuzzer) total-vm:1240788kB, anon-rss:279772kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:924kB oom_score_adj:0 [ 2393.790901] systemd[1]: ssh.service: A process of this unit has been killed by the OOM killer. [ 2393.823803] systemd[1]: Starting Load/Save RF Kill Switch Status... [ 2393.885848] systemd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2393.886965] CPU: 1 PID: 11739 Comm: systemd Not tainted 5.10.232 #1 [ 2393.887682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2393.888628] Call Trace: [ 2393.888933] dump_stack+0x107/0x167 [ 2393.889350] dump_header+0x106/0x655 [ 2393.889795] oom_kill_process.cold+0x10/0x15 [ 2393.890300] out_of_memory+0x1149/0x1440 [ 2393.890768] ? oom_killer_disable+0x280/0x280 [ 2393.891279] ? mutex_trylock+0x237/0x2b0 [ 2393.891741] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2393.892421] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2393.893096] ? lock_acquire+0x167/0x470 [ 2393.893560] ? warn_alloc+0x190/0x190 [ 2393.894007] __alloc_pages_nodemask+0x51d/0x600 [ 2393.894539] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2393.895231] ? find_get_entry+0x2c8/0x740 [ 2393.895710] alloc_pages_current+0x187/0x280 [ 2393.896212] __page_cache_alloc+0x2d2/0x360 [ 2393.896705] pagecache_get_page+0x2c7/0xc80 [ 2393.897199] filemap_fault+0x177d/0x2210 [ 2393.897672] ? read_cache_page_gfp+0x30/0x30 [ 2393.898171] ? replace_page_cache_page+0x1200/0x1200 [ 2393.898751] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2393.899351] ext4_filemap_fault+0x87/0xc0 [ 2393.899821] __do_fault+0x113/0x410 [ 2393.900237] handle_mm_fault+0x1e53/0x3500 [ 2393.900719] ? find_held_lock+0x2c/0x110 [ 2393.901178] ? __pmd_alloc+0x5e0/0x5e0 [ 2393.901636] ? vmacache_find+0x55/0x2a0 [ 2393.902088] ? vmacache_update+0xce/0x140 [ 2393.902570] do_user_addr_fault+0x56e/0xc60 [ 2393.903068] exc_page_fault+0xa2/0x1a0 [ 2393.903509] ? asm_exc_page_fault+0x8/0x30 [ 2393.903992] asm_exc_page_fault+0x1e/0x30 [ 2393.904460] RIP: 0033:0x7fb4a26e40b4 [ 2393.904882] Code: 43 68 48 8b 40 08 48 89 44 24 10 48 8b 83 00 03 00 00 48 85 c0 0f 84 d3 00 00 00 48 8b 7c 24 28 8b 4c 24 30 23 8b f8 02 00 00 <48> 8b 04 c8 8b 8b fc 02 00 00 48 89 fe 48 d3 ee 48 89 f1 48 89 c6 [ 2393.906989] RSP: 002b:00007ffcaf67dc10 EFLAGS: 00010202 [ 2393.907594] RAX: 00007fb4a1e54448 RBX: 00007fb4a1e82510 RCX: 0000000000000001 [ 2393.908408] RDX: 000000000000001b RSI: 0000000000000035 RDI: 000000007c8ad2ef [ 2393.909218] RBP: 0000000000000014 R08: 00007ffcaf67dd50 R09: 00007fb4a2706440 [ 2393.910034] R10: 00007fb4a1e83710 R11: 000000000000001b R12: 000000000000001b [ 2393.910847] R13: 00007fb4a1d90f10 R14: 0000000000000001 R15: 0000000000000000 [ 2393.911722] Mem-Info: [ 2393.912043] active_anon:19585 inactive_anon:59703 isolated_anon:0 [ 2393.912043] active_file:597 inactive_file:461 isolated_file:0 [ 2393.912043] unevictable:0 dirty:0 writeback:8 [ 2393.912043] slab_reclaimable:8461 slab_unreclaimable:60469 [ 2393.912043] mapped:55746 shmem:122 pagetables:1449 bounce:0 [ 2393.912043] free:2853 free_pcp:103 free_cma:0 [ 2393.915674] Node 0 active_anon:78340kB inactive_anon:238812kB active_file:2296kB inactive_file:1928kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:221808kB dirty:0kB writeback:32kB shmem:488kB writeback_tmp:0kB kernel_stack:4032kB all_unreclaimable? no [ 2393.918324] Node 0 DMA free:6484kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2393.921283] lowmem_reserve[]: 0 1616 1616 1616 [ 2393.921837] Node 0 DMA32 free:4928kB min:11260kB low:12912kB high:14564kB reserved_highatomic:0KB active_anon:78340kB inactive_anon:238644kB active_file:2352kB inactive_file:1900kB unevictable:0kB writepending:32kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:5796kB bounce:0kB free_pcp:616kB local_pcp:132kB free_cma:0kB [ 2393.925190] lowmem_reserve[]: 0 0 0 0 [ 2393.925659] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2393.927204] Node 0 DMA32: 524*4kB (UM) 119*8kB (UM) 36*16kB (UME) 13*32kB (UME) 5*64kB (U) 3*128kB (U) 3*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 5512kB [ 2393.928921] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2393.929899] 1114 total pagecache pages [ 2393.930354] 0 pages in swap cache [ 2393.930744] Swap cache stats: add 0, delete 0, find 0/0 [ 2393.931359] Free swap = 0kB [ 2393.931698] Total swap = 0kB [ 2393.932060] 524158 pages RAM [ 2393.932401] 0 pages HighMem/MovableOnly [ 2393.932843] 105067 pages reserved [ 2393.933255] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-rfkill.service,task=systemd,pid=11739,uid=0 [ 2393.935126] Out of memory (oom_kill_allocating_task): Killed process 11739 (systemd) total-vm:114464kB, anon-rss:11112kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:92kB oom_score_adj:0 [ 2394.087203] systemd[1]: systemd-rfkill.service: A process of this unit has been killed by the OOM killer. [ 2394.282289] systemd[1]: systemd-rfkill.service: Main process exited, code=killed, status=9/KILL [ 2394.287110] systemd[1]: systemd-rfkill.service: Failed with result 'oom-kill'. [ 2394.303893] systemd[1]: Failed to start Load/Save RF Kill Switch Status. [ 2394.394092] systemd[1]: Starting Load/Save RF Kill Switch Status... [ 2394.402153] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 2394.403573] systemd[1]: ssh.service: Unit process 248 (sshd) remains running after unit stopped. [ 2394.456503] systemd[1]: ssh.service: Consumed 34min 53.538s CPU time. [ 2394.529255] systemd-udevd invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=1, oom_score_adj=0 [ 2394.530584] CPU: 1 PID: 11731 Comm: systemd-udevd Not tainted 5.10.232 #1 [ 2394.531361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2394.532311] Call Trace: [ 2394.532615] dump_stack+0x107/0x167 [ 2394.533031] dump_header+0x106/0x655 [ 2394.533465] oom_kill_process.cold+0x10/0x15 [ 2394.533970] out_of_memory+0x1149/0x1440 [ 2394.534442] ? oom_killer_disable+0x280/0x280 [ 2394.534954] ? mutex_trylock+0x237/0x2b0 [ 2394.535417] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2394.536103] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2394.536771] ? lock_acquire+0x167/0x470 [ 2394.537228] ? warn_alloc+0x190/0x190 [ 2394.537675] ? stack_trace_consume_entry+0x160/0x160 [ 2394.538263] __alloc_pages_nodemask+0x51d/0x600 [ 2394.538797] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2394.539494] ? kmem_cache_alloc+0x301/0x310 [ 2394.539990] alloc_pages_current+0x187/0x280 [ 2394.540499] allocate_slab+0x29b/0x380 [ 2394.540947] ___slab_alloc+0x470/0x700 [ 2394.541397] ? getname_flags.part.0+0x50/0x4f0 [ 2394.541933] ? getname_flags.part.0+0x50/0x4f0 [ 2394.542470] ? kmem_cache_alloc+0x301/0x310 [ 2394.542977] ? getname_flags.part.0+0x50/0x4f0 [ 2394.543518] kmem_cache_alloc+0x301/0x310 [ 2394.544010] getname_flags.part.0+0x50/0x4f0 [ 2394.544542] ? __secure_computing+0x199/0x2f0 [ 2394.545067] __x64_sys_unlink+0xb1/0x100 [ 2394.545551] do_syscall_64+0x33/0x40 [ 2394.545990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2394.546599] RIP: 0033:0x7fa064887b57 [ 2394.547038] Code: f0 ff ff 73 01 c3 48 8b 0d 36 d3 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 09 d3 0c 00 f7 d8 64 89 01 48 [ 2394.549139] RSP: 002b:00007ffdc98aeac8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 2394.550029] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa064887b57 [ 2394.550850] RDX: 0000000000000010 RSI: 0000557bb854d970 RDI: 00007ffdc98aead0 [ 2394.551665] RBP: 00007ffdc98aeb20 R08: 0000557bb858f1a0 R09: 0000000000000000 [ 2394.552486] R10: 00007fa064908ac0 R11: 0000000000000246 R12: 0000000000000000 [ 2394.553323] R13: 0000557bb854d970 R14: 0000557bb854cb80 R15: 0000000000000000 [ 2394.554248] Mem-Info: [ 2394.554605] active_anon:13007 inactive_anon:24660 isolated_anon:21 [ 2394.554605] active_file:368 inactive_file:302 isolated_file:22 [ 2394.554605] unevictable:0 dirty:14 writeback:0 [ 2394.554605] slab_reclaimable:8047 slab_unreclaimable:58950 [ 2394.554605] mapped:9196 shmem:96 pagetables:581 bounce:0 [ 2394.554605] free:3291 free_pcp:117 free_cma:0 [ 2394.558464] Node 0 active_anon:52028kB inactive_anon:98640kB active_file:1472kB inactive_file:1208kB unevictable:0kB isolated(anon):84kB isolated(file):0kB mapped:36784kB dirty:56kB writeback:0kB shmem:384kB writeback_tmp:0kB kernel_stack:2976kB all_unreclaimable? no [ 2394.561210] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:12kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2394.564224] lowmem_reserve[]: 0 1616 1616 1616 [ 2394.564772] Node 0 DMA32 free:6044kB min:13308kB low:14960kB high:16612kB reserved_highatomic:0KB active_anon:51524kB inactive_anon:98196kB active_file:1792kB inactive_file:2036kB unevictable:0kB writepending:56kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:2312kB bounce:0kB free_pcp:752kB local_pcp:196kB free_cma:0kB [ 2394.568132] lowmem_reserve[]: 0 0 0 0 [ 2394.568600] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2394.570220] Node 0 DMA32: 540*4kB (ME) 114*8kB (UME) 69*16kB (UME) 35*32kB (UME) 12*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6064kB [ 2394.571937] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2394.572965] 694 total pagecache pages [ 2394.573434] 0 pages in swap cache [ 2394.573852] Swap cache stats: add 0, delete 0, find 0/0 [ 2394.574497] Free swap = 0kB [ 2394.574857] Total swap = 0kB [ 2394.575236] 524158 pages RAM [ 2394.575589] 0 pages HighMem/MovableOnly [ 2394.576065] 105067 pages reserved [ 2394.576484] Unreclaimable slab info: [ 2394.577048] Name Used Total [ 2394.577741] pid_2 44KB 75KB [ 2394.578395] IEEE-802.15.4-RAW 63KB 63KB [ 2394.579044] p9_req_t 8KB 8KB [ 2394.579689] fib6_nodes 28KB 28KB [ 2394.580356] ip6_dst_cache 41KB 41KB [ 2394.580981] PINGv6 31KB 31KB [ 2394.581642] RAWv6 220KB 220KB [ 2394.582292] UDPLITEv6 62KB 62KB [ 2394.582909] UDPv6 62KB 62KB [ 2394.583543] tw_sock_TCPv6 15KB 15KB [ 2394.584176] TCPv6 62KB 62KB [ 2394.584795] scsi_sense_cache 8KB 8KB [ 2394.585441] sd_ext_cdb 3KB 3KB [ 2394.586075] virtio_scsi_cmd 16KB 16KB [ 2394.586693] sgpool-128 59KB 59KB [ 2394.587327] sgpool-64 63KB 63KB [ 2394.587939] sgpool-32 236KB 236KB [ 2394.588574] sgpool-16 97KB 97KB [ 2394.589204] sgpool-8 82KB 82KB [ 2394.589826] io_kiocb 37KB 37KB [ 2394.590489] mqueue_inode_cache 62KB 62KB [ 2394.591545] nfs_commit_data 15KB 15KB [ 2394.592569] nfs_write_data 47KB 47KB [ 2394.593277] jbd2_inode 11KB 11KB [ 2394.593925] ext4_system_zone 3KB 3KB [ 2394.594589] ext4_io_end_vec 7KB 7KB [ 2394.595250] ext4_bio_post_read_ctx 15KB 15KB [ 2394.595941] kioctx 31KB 31KB [ 2394.596583] aio_kiocb 7KB 7KB [ 2394.597216] bio-2 4KB 4KB [ 2394.597833] fasync_cache 7KB 7KB [ 2394.598458] pid_namespace 7KB 7KB [ 2394.599081] posix_timers_cache 15KB 15KB [ 2394.599727] rpc_buffers 31KB 31KB [ 2394.600366] rpc_tasks 3KB 3KB [ 2394.601022] UNIX 286KB 320KB [ 2394.601672] UDP-Lite 31KB 31KB [ 2394.602336] tcp_bind_bucket 8KB 8KB [ 2394.602973] ip_fib_trie 8KB 8KB [ 2394.603601] ip_fib_alias 15KB 15KB [ 2394.604223] ip_dst_cache 80KB 80KB [ 2394.604851] RAW 93KB 93KB [ 2394.605519] UDP 105KB 283KB [ 2394.606161] request_sock_TCP 15KB 15KB [ 2394.606898] TCP 90KB 90KB [ 2394.607534] hugetlbfs_inode_cache 30KB 30KB [ 2394.608200] bio-1 11KB 11KB [ 2394.608804] eventpoll_pwq 23KB 23KB [ 2394.609434] eventpoll_epi 43KB 43KB [ 2394.610059] inotify_inode_mark 66KB 66KB [ 2394.610671] request_queue 60KB 60KB [ 2394.611306] blkdev_ioc 18KB 18KB [ 2394.611953] bio-0 309KB 328KB [ 2394.612772] biovec-max 743KB 743KB [ 2394.613528] biovec-64 378KB 378KB [ 2394.614276] biovec-16 71KB 71KB [ 2394.615006] uid_cache 8KB 8KB [ 2394.615667] dmaengine-unmap-2 4KB 4KB [ 2394.616300] audit_buffer 7KB 7KB [ 2394.616971] skbuff_fclone_cache 112KB 150KB [ 2394.617841] skbuff_head_cache 535KB 573KB [ 2394.618573] file_lock_cache 27KB 43KB [ 2394.619233] file_lock_ctx 7KB 7KB [ 2394.619866] fsnotify_mark_connector 24KB 24KB [ 2394.620709] net_namespace 143KB 143KB [ 2394.621520] task_delay_info 89KB 100KB [ 2394.622284] taskstats 84KB 84KB [ 2394.623097] proc_dir_entry 388KB 401KB [ 2394.623856] pde_opener 27KB 27KB [ 2394.624493] seq_file 75KB 75KB [ 2394.625155] sigqueue 90KB 90KB [ 2394.625791] shmem_inode_cache 1293KB 1352KB [ 2394.626438] kernfs_iattrs_cache 254KB 254KB [ 2394.627089] kernfs_node_cache 5611KB 5611KB [ 2394.627691] mnt_cache 204KB 204KB [ 2394.628328] filp 1073KB 1657KB [ 2394.628933] names_cache 6668KB 6672KB [ 2394.629685] hashtab_node 274KB 274KB [ 2394.630441] ebitmap_node 1149KB 1149KB [ 2394.631094] avtab_node 4976KB 4976KB [ 2394.631728] avc_node 35KB 35KB [ 2394.632390] lsm_inode_cache 2823KB 3142KB [ 2394.633050] lsm_file_cache 134KB 180KB [ 2394.633691] key_jar 39KB 39KB [ 2394.634330] uts_namespace 15KB 15KB [ 2394.634966] nsproxy 11KB 11KB [ 2394.635635] vm_area_struct 1112KB 1212KB [ 2394.636276] fs_cache 36KB 60KB [ 2394.636967] files_cache 179KB 223KB [ 2394.637672] signal_cache 360KB 432KB [ 2394.638327] sighand_cache 256KB 360KB [ 2394.638953] task_struct 1056KB 1470KB [ 2394.639579] cred_jar 138KB 172KB [ 2394.640200] anon_vma_chain 271KB 303KB [ 2394.640816] anon_vma 203KB 270KB [ 2394.641465] pid 46KB 71KB [ 2394.642101] Acpi-Operand 240KB 273KB [ 2394.642718] Acpi-ParseExt 27KB 27KB [ 2394.643356] Acpi-Parse 166KB 181KB [ 2394.643968] Acpi-State 212KB 228KB [ 2394.644716] Acpi-Namespace 20KB 20KB [ 2394.645516] numa_policy 3KB 3KB [ 2394.646285] trace_event_file 176KB 176KB [ 2394.647104] ftrace_event_field 280KB 280KB [ 2394.647793] pool_workqueue 40KB 40KB [ 2394.648521] task_group 16KB 16KB [ 2394.649273] mm_struct 264KB 346KB [ 2394.649920] vmap_area 196KB 244KB [ 2394.650562] page->ptl 291KB 291KB [ 2394.651213] kmemleak_scan_area 157KB 191KB [ 2394.652818] kmemleak_object 135934KB 152178KB [ 2394.653484] kmalloc-8k 4752KB 4960KB [ 2394.654111] kmalloc-4k 7840KB 7872KB [ 2394.654724] kmalloc-2k 4572KB 4736KB [ 2394.655356] kmalloc-1k 2678KB 3456KB [ 2394.656014] kmalloc-512 3175KB 5040KB [ 2394.656619] kmalloc-256 1408KB 1408KB [ 2394.657257] kmalloc-192 536KB 536KB [ 2394.657878] kmalloc-128 516KB 560KB [ 2394.658529] kmalloc-96 394KB 744KB [ 2394.659304] kmalloc-64 976KB 1356KB [ 2394.660087] kmalloc-32 792KB 820KB [ 2394.660840] kmalloc-16 327KB 364KB [ 2394.661650] kmalloc-8 334KB 334KB [ 2394.662501] kmem_cache_node 47KB 47KB [ 2394.663291] kmem_cache 75KB 75KB [ 2394.664121] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-udevd.service,task=systemd-udevd,pid=11731,uid=0 [ 2394.667074] Out of memory (oom_kill_allocating_task): Killed process 11731 (systemd-udevd) total-vm:35752kB, anon-rss:10268kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 2394.689715] systemd[1]: systemd-udevd.service: A process of this unit has been killed by the OOM killer. [ 2394.695910] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 1. [ 2394.702380] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2394.722824] (journald) invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 2394.724072] CPU: 1 PID: 11738 Comm: (journald) Not tainted 5.10.232 #1 [ 2394.724848] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2394.725840] Call Trace: [ 2394.726145] dump_stack+0x107/0x167 [ 2394.726581] dump_header+0x106/0x655 [ 2394.727027] oom_kill_process.cold+0x10/0x15 [ 2394.727560] out_of_memory+0x1149/0x1440 [ 2394.728051] ? oom_killer_disable+0x280/0x280 [ 2394.728584] ? mutex_trylock+0x237/0x2b0 [ 2394.729039] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2394.729715] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2394.730395] ? lock_acquire+0x167/0x470 [ 2394.730853] ? warn_alloc+0x190/0x190 [ 2394.731301] __alloc_pages_nodemask+0x51d/0x600 [ 2394.731834] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2394.732528] ? find_get_entry+0x2c8/0x740 [ 2394.733005] alloc_pages_current+0x187/0x280 [ 2394.733512] __page_cache_alloc+0x2d2/0x360 [ 2394.734003] pagecache_get_page+0x2c7/0xc80 [ 2394.734499] filemap_fault+0x177d/0x2210 [ 2394.734967] ? read_cache_page_gfp+0x30/0x30 [ 2394.735475] ? handle_mm_fault+0x28b1/0x3500 [ 2394.735977] ? lock_downgrade+0x6d0/0x6d0 [ 2394.736456] ext4_filemap_fault+0x87/0xc0 [ 2394.736929] __do_fault+0x113/0x410 [ 2394.737345] handle_mm_fault+0x1e53/0x3500 [ 2394.737841] ? recalibrate_cpu_khz+0x10/0x10 [ 2394.738344] ? __pmd_alloc+0x5e0/0x5e0 [ 2394.738793] ? vmacache_find+0x55/0x2a0 [ 2394.739248] ? vmacache_update+0xce/0x140 [ 2394.739742] do_user_addr_fault+0x56e/0xc60 [ 2394.740261] exc_page_fault+0xa2/0x1a0 [ 2394.740722] ? asm_exc_page_fault+0x8/0x30 [ 2394.741210] asm_exc_page_fault+0x1e/0x30 [ 2394.741709] RIP: 0033:0x7fb4a2419210 [ 2394.742139] Code: Unable to access opcode bytes at RIP 0x7fb4a24191e6. [ 2394.742918] RSP: 002b:00007ffcaf67dea8 EFLAGS: 00010246 [ 2394.743555] RAX: 0000000000000000 RBX: 00005560ddfc6ac0 RCX: 00007ffcaf67df50 [ 2394.744408] RDX: 00007fb4a2425df8 RSI: 00007ffcaf67dec0 RDI: 00005560ddfc6ac0 [ 2394.745256] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fb4a230ebe0 [ 2394.746130] R10: 00007ffcaf67df60 R11: 0000000000000000 R12: 00007ffcaf67df48 [ 2394.746986] R13: 00005560ddf773c8 R14: 0000000000000000 R15: 00007ffcaf67df50 [ 2394.747877] Mem-Info: [ 2394.748199] active_anon:4754 inactive_anon:23253 isolated_anon:21 [ 2394.748199] active_file:477 inactive_file:469 isolated_file:25 [ 2394.748199] unevictable:0 dirty:14 writeback:0 [ 2394.748199] slab_reclaimable:7702 slab_unreclaimable:58949 [ 2394.748199] mapped:9532 shmem:96 pagetables:581 bounce:0 [ 2394.748199] free:3842 free_pcp:123 free_cma:0 [ 2394.751844] Node 0 active_anon:19016kB inactive_anon:93012kB active_file:1824kB inactive_file:1876kB unevictable:0kB isolated(anon):84kB isolated(file):100kB mapped:38128kB dirty:56kB writeback:0kB shmem:384kB writeback_tmp:0kB kernel_stack:2976kB all_unreclaimable? no [ 2394.754551] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:12kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2394.757647] lowmem_reserve[]: 0 1616 1616 1616 [ 2394.758224] Node 0 DMA32 free:7768kB min:17744kB low:19396kB high:21048kB reserved_highatomic:0KB active_anon:19268kB inactive_anon:93156kB active_file:2236kB inactive_file:1856kB unevictable:0kB writepending:56kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:2312kB bounce:0kB free_pcp:644kB local_pcp:192kB free_cma:0kB [ 2394.761821] lowmem_reserve[]: 0 0 0 0 [ 2394.762305] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2394.763936] Node 0 DMA32: 615*4kB (UME) 350*8kB (UME) 145*16kB (UME) 20*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8220kB [ 2394.765570] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2394.766565] 925 total pagecache pages [ 2394.767012] 0 pages in swap cache [ 2394.767405] Swap cache stats: add 0, delete 0, find 0/0 [ 2394.768023] Free swap = 0kB [ 2394.768371] Total swap = 0kB [ 2394.768718] 524158 pages RAM [ 2394.769077] 0 pages HighMem/MovableOnly [ 2394.769547] 105067 pages reserved [ 2394.770021] Unreclaimable slab info: [ 2394.770633] Name Used Total [ 2394.771360] pid_2 44KB 75KB [ 2394.772017] IEEE-802.15.4-RAW 63KB 63KB [ 2394.772639] p9_req_t 8KB 8KB [ 2394.773278] fib6_nodes 28KB 28KB [ 2394.773914] ip6_dst_cache 41KB 41KB [ 2394.774562] PINGv6 31KB 31KB [ 2394.775190] RAWv6 220KB 220KB [ 2394.775825] UDPLITEv6 62KB 62KB [ 2394.776473] UDPv6 62KB 62KB [ 2394.777111] tw_sock_TCPv6 15KB 15KB [ 2394.777745] TCPv6 62KB 62KB [ 2394.778372] scsi_sense_cache 8KB 8KB [ 2394.779018] sd_ext_cdb 3KB 3KB [ 2394.779644] virtio_scsi_cmd 16KB 16KB [ 2394.780300] sgpool-128 59KB 59KB [ 2394.780908] sgpool-64 63KB 63KB [ 2394.781549] sgpool-32 267KB 267KB [ 2394.782168] sgpool-16 105KB 105KB [ 2394.782775] sgpool-8 86KB 86KB [ 2394.783424] io_kiocb 37KB 37KB [ 2394.784074] mqueue_inode_cache 62KB 62KB [ 2394.784707] nfs_commit_data 15KB 15KB [ 2394.785345] nfs_write_data 47KB 47KB [ 2394.785982] jbd2_inode 11KB 11KB [ 2394.786633] ext4_system_zone 3KB 3KB [ 2394.787280] ext4_io_end_vec 7KB 7KB [ 2394.787910] ext4_bio_post_read_ctx 15KB 15KB [ 2394.788603] kioctx 31KB 31KB [ 2394.789225] aio_kiocb 7KB 7KB [ 2394.789865] bio-2 4KB 4KB [ 2394.790518] fasync_cache 7KB 7KB [ 2394.791165] pid_namespace 7KB 7KB [ 2394.791796] posix_timers_cache 15KB 15KB [ 2394.792457] rpc_buffers 31KB 31KB [ 2394.793099] rpc_tasks 3KB 3KB [ 2394.793737] UNIX 286KB 320KB [ 2394.794391] UDP-Lite 31KB 31KB [ 2394.795038] tcp_bind_bucket 8KB 8KB [ 2394.795674] ip_fib_trie 8KB 8KB [ 2394.796845] ip_fib_alias 15KB 15KB [ 2394.797635] ip_dst_cache 80KB 80KB [ 2394.798310] RAW 93KB 93KB [ 2394.798946] UDP 105KB 283KB [ 2394.799606] request_sock_TCP 15KB 15KB [ 2394.800261] TCP 90KB 90KB [ 2394.800892] hugetlbfs_inode_cache 30KB 30KB [ 2394.801588] bio-1 11KB 11KB [ 2394.802236] eventpoll_pwq 23KB 23KB [ 2394.802844] eventpoll_epi 43KB 43KB [ 2394.803466] inotify_inode_mark 66KB 66KB [ 2394.804109] request_queue 60KB 60KB [ 2394.804736] blkdev_ioc 18KB 18KB [ 2394.805377] bio-0 317KB 328KB [ 2394.806021] biovec-max 616KB 743KB [ 2394.806637] biovec-64 409KB 409KB [ 2394.807280] biovec-16 71KB 71KB [ 2394.807912] uid_cache 8KB 8KB [ 2394.808554] dmaengine-unmap-2 4KB 4KB [ 2394.809201] audit_buffer 7KB 7KB [ 2394.809810] skbuff_fclone_cache 112KB 150KB [ 2394.810478] skbuff_head_cache 546KB 573KB [ 2394.811132] file_lock_cache 27KB 43KB [ 2394.811759] file_lock_ctx 7KB 7KB [ 2394.812407] fsnotify_mark_connector 24KB 24KB [ 2394.813087] net_namespace 143KB 143KB [ 2394.813696] task_delay_info 89KB 100KB [ 2394.814319] taskstats 84KB 84KB [ 2394.814927] proc_dir_entry 388KB 401KB [ 2394.815573] pde_opener 27KB 27KB [ 2394.816220] seq_file 78KB 78KB [ 2394.816846] sigqueue 90KB 90KB [ 2394.817495] shmem_inode_cache 1293KB 1352KB [ 2394.818135] kernfs_iattrs_cache 254KB 254KB [ 2394.818788] kernfs_node_cache 5611KB 5611KB [ 2394.819416] mnt_cache 204KB 204KB [ 2394.820064] filp 970KB 1567KB [ 2394.820674] names_cache 6596KB 6672KB [ 2394.821302] hashtab_node 274KB 274KB [ 2394.821917] ebitmap_node 1149KB 1149KB [ 2394.822570] avtab_node 4976KB 4976KB [ 2394.823210] avc_node 35KB 35KB [ 2394.823859] lsm_inode_cache 2782KB 3071KB [ 2394.824501] lsm_file_cache 134KB 180KB [ 2394.825142] key_jar 39KB 39KB [ 2394.825778] uts_namespace 15KB 15KB [ 2394.826421] nsproxy 11KB 11KB [ 2394.827069] vm_area_struct 1112KB 1212KB [ 2394.827706] fs_cache 36KB 60KB [ 2394.828347] files_cache 179KB 223KB [ 2394.828967] signal_cache 360KB 432KB [ 2394.829627] sighand_cache 256KB 360KB [ 2394.830287] task_struct 1056KB 1470KB [ 2394.830917] cred_jar 103KB 172KB [ 2394.831557] anon_vma_chain 271KB 303KB [ 2394.832205] anon_vma 203KB 270KB [ 2394.832804] pid 46KB 71KB [ 2394.833452] Acpi-Operand 240KB 273KB [ 2394.834075] Acpi-ParseExt 27KB 27KB [ 2394.834701] Acpi-Parse 166KB 181KB [ 2394.835344] Acpi-State 212KB 228KB [ 2394.835961] Acpi-Namespace 20KB 20KB [ 2394.836598] numa_policy 3KB 3KB [ 2394.837239] trace_event_file 176KB 176KB [ 2394.837871] ftrace_event_field 280KB 280KB [ 2394.838523] pool_workqueue 40KB 40KB [ 2394.839163] task_group 16KB 16KB [ 2394.839782] mm_struct 264KB 346KB [ 2394.840409] vmap_area 196KB 244KB [ 2394.841044] page->ptl 291KB 291KB [ 2394.841669] kmemleak_scan_area 157KB 191KB [ 2394.843066] kmemleak_object 135033KB 152118KB [ 2394.843708] kmalloc-8k 4752KB 4960KB [ 2394.844363] kmalloc-4k 8008KB 8008KB [ 2394.845000] kmalloc-2k 4572KB 4736KB [ 2394.845644] kmalloc-1k 2678KB 3456KB [ 2394.846325] kmalloc-512 3214KB 5040KB [ 2394.846956] kmalloc-256 1416KB 1416KB [ 2394.847609] kmalloc-192 540KB 540KB [ 2394.848270] kmalloc-128 514KB 560KB [ 2394.848920] kmalloc-96 394KB 744KB [ 2394.849605] kmalloc-64 976KB 1356KB [ 2394.850255] kmalloc-32 796KB 820KB [ 2394.850864] kmalloc-16 327KB 364KB [ 2394.851520] kmalloc-8 334KB 334KB [ 2394.852177] kmem_cache_node 47KB 47KB [ 2394.852787] kmem_cache 75KB 75KB [ 2394.853439] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=(journald),pid=11738,uid=0 [ 2394.855405] Out of memory (oom_kill_allocating_task): Killed process 11738 ((journald)) total-vm:114732kB, anon-rss:11336kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:96kB oom_score_adj:-250 [ 2394.962609] sshd invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 2394.963744] CPU: 0 PID: 248 Comm: sshd Not tainted 5.10.232 #1 [ 2394.964440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2394.965422] Call Trace: [ 2394.965750] dump_stack+0x107/0x167 [ 2394.966178] dump_header+0x106/0x655 [ 2394.966617] oom_kill_process.cold+0x10/0x15 [ 2394.967148] out_of_memory+0x1149/0x1440 [ 2394.967630] ? oom_killer_disable+0x280/0x280 [ 2394.968161] ? mutex_trylock+0x237/0x2b0 [ 2394.968643] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2394.969338] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2394.970023] ? lock_acquire+0x167/0x470 [ 2394.970493] ? warn_alloc+0x190/0x190 [ 2394.970957] __alloc_pages_nodemask+0x51d/0x600 [ 2394.971505] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2394.972212] ? find_get_entry+0x2c8/0x740 [ 2394.972698] alloc_pages_current+0x187/0x280 [ 2394.973219] __page_cache_alloc+0x2d2/0x360 [ 2394.973743] pagecache_get_page+0x2c7/0xc80 [ 2394.974274] filemap_fault+0x177d/0x2210 [ 2394.974768] ? read_cache_page_gfp+0x30/0x30 [ 2394.975291] ? replace_page_cache_page+0x1200/0x1200 [ 2394.975894] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 2394.976522] ext4_filemap_fault+0x87/0xc0 [ 2394.977013] __do_fault+0x113/0x410 [ 2394.977458] handle_mm_fault+0x1e53/0x3500 [ 2394.977958] ? slab_free_freelist_hook+0xa9/0x180 [ 2394.978522] ? __pmd_alloc+0x5e0/0x5e0 [ 2394.978985] ? vmacache_find+0x55/0x2a0 [ 2394.979447] ? vmacache_update+0xce/0x140 [ 2394.979934] do_user_addr_fault+0x56e/0xc60 [ 2394.980442] exc_page_fault+0xa2/0x1a0 [ 2394.980886] ? asm_exc_page_fault+0x8/0x30 [ 2394.981364] asm_exc_page_fault+0x1e/0x30 [ 2394.981855] RIP: 0033:0x7f33922f4160 [ 2394.982289] Code: Unable to access opcode bytes at RIP 0x7f33922f4136. [ 2394.983048] RSP: 002b:00007ffd18cdbe68 EFLAGS: 00010202 [ 2394.983671] RAX: 0000000000000001 RBX: 00007f33922f6d68 RCX: 0000000000000000 [ 2394.984483] RDX: 0000000000000000 RSI: 00007f3392ebd740 RDI: 000055641122b8a0 [ 2394.985294] RBP: 00007f33922f6d68 R08: 000055641120d0d0 R09: 0000000000000000 [ 2394.986110] R10: 0000000000000003 R11: 0000000200000000 R12: 000055641122b8a0 [ 2394.986918] R13: 0000000000000021 R14: 0000000000000020 R15: 0000000000000000 [ 2394.987820] Mem-Info: [ 2394.988139] active_anon:29 inactive_anon:7524 isolated_anon:21 [ 2394.988139] active_file:619 inactive_file:428 isolated_file:32 [ 2394.988139] unevictable:0 dirty:14 writeback:0 [ 2394.988139] slab_reclaimable:7702 slab_unreclaimable:58302 [ 2394.988139] mapped:9490 shmem:96 pagetables:391 bounce:0 [ 2394.988139] free:2986 free_pcp:351 free_cma:0 [ 2394.991732] Node 0 active_anon:116kB inactive_anon:30096kB active_file:2476kB inactive_file:1712kB unevictable:0kB isolated(anon):84kB isolated(file):0kB mapped:37792kB dirty:56kB writeback:0kB shmem:384kB writeback_tmp:0kB kernel_stack:2912kB all_unreclaimable? no [ 2394.994365] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2394.997357] lowmem_reserve[]: 0 1616 1616 1616 [ 2394.997905] Node 0 DMA32 free:5456kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:116kB inactive_anon:30660kB active_file:2040kB inactive_file:1356kB unevictable:0kB writepending:56kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:1560kB bounce:0kB free_pcp:1700kB local_pcp:192kB free_cma:0kB [ 2395.001442] lowmem_reserve[]: 0 0 0 0 [ 2395.001906] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2395.003527] Node 0 DMA32: 433*4kB (UME) 200*8kB (UME) 108*16kB (UME) 43*32kB (UM) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 6500kB [ 2395.005221] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2395.006238] 1030 total pagecache pages [ 2395.006689] 0 pages in swap cache [ 2395.007102] Swap cache stats: add 0, delete 0, find 0/0 [ 2395.007727] Free swap = 0kB [ 2395.008101] Total swap = 0kB [ 2395.008447] 524158 pages RAM [ 2395.008800] 0 pages HighMem/MovableOnly [ 2395.009275] 105067 pages reserved [ 2395.009684] Unreclaimable slab info: [ 2395.010126] Name Used Total [ 2395.010776] pid_2 44KB 75KB [ 2395.011417] IEEE-802.15.4-RAW 63KB 63KB [ 2395.012052] p9_req_t 8KB 8KB [ 2395.012686] fib6_nodes 28KB 28KB [ 2395.013324] ip6_dst_cache 41KB 41KB [ 2395.013953] PINGv6 31KB 31KB [ 2395.014599] RAWv6 220KB 220KB [ 2395.015238] UDPLITEv6 62KB 62KB [ 2395.015856] UDPv6 62KB 62KB [ 2395.016497] tw_sock_TCPv6 15KB 15KB [ 2395.017135] TCPv6 62KB 62KB [ 2395.017774] scsi_sense_cache 8KB 8KB [ 2395.018418] sd_ext_cdb 3KB 3KB [ 2395.019056] virtio_scsi_cmd 16KB 16KB [ 2395.019683] sgpool-128 59KB 59KB [ 2395.020327] sgpool-64 63KB 63KB [ 2395.020944] sgpool-32 299KB 299KB [ 2395.021602] sgpool-16 120KB 120KB [ 2395.022246] sgpool-8 86KB 86KB [ 2395.022870] io_kiocb 37KB 37KB [ 2395.023512] mqueue_inode_cache 62KB 62KB [ 2395.024195] nfs_commit_data 15KB 15KB [ 2395.024887] nfs_write_data 47KB 47KB [ 2395.025529] jbd2_inode 11KB 11KB [ 2395.026158] ext4_system_zone 3KB 3KB [ 2395.026764] ext4_io_end_vec 7KB 7KB [ 2395.027388] ext4_bio_post_read_ctx 15KB 15KB [ 2395.028064] kioctx 31KB 31KB [ 2395.028671] aio_kiocb 7KB 7KB [ 2395.029300] bio-2 4KB 4KB [ 2395.029928] fasync_cache 7KB 7KB [ 2395.030573] pid_namespace 7KB 7KB [ 2395.031214] posix_timers_cache 15KB 15KB [ 2395.031848] rpc_buffers 31KB 31KB [ 2395.032488] rpc_tasks 3KB 3KB [ 2395.033132] UNIX 286KB 320KB [ 2395.033766] UDP-Lite 31KB 31KB [ 2395.034408] tcp_bind_bucket 8KB 8KB [ 2395.035040] ip_fib_trie 8KB 8KB [ 2395.035647] ip_fib_alias 15KB 15KB [ 2395.036279] ip_dst_cache 80KB 80KB [ 2395.036887] RAW 93KB 93KB [ 2395.037517] UDP 105KB 283KB [ 2395.038139] request_sock_TCP 15KB 15KB [ 2395.038746] TCP 90KB 90KB [ 2395.039374] hugetlbfs_inode_cache 30KB 30KB [ 2395.040056] bio-1 11KB 11KB [ 2395.040668] eventpoll_pwq 23KB 23KB [ 2395.041289] eventpoll_epi 43KB 43KB [ 2395.041902] inotify_inode_mark 66KB 66KB [ 2395.042533] request_queue 60KB 60KB [ 2395.043154] blkdev_ioc 18KB 18KB [ 2395.043763] bio-0 348KB 348KB [ 2395.044396] biovec-max 429KB 535KB [ 2395.045036] biovec-64 456KB 456KB [ 2395.045666] biovec-16 75KB 75KB [ 2395.046310] uid_cache 8KB 8KB [ 2395.046938] dmaengine-unmap-2 4KB 4KB [ 2395.047577] audit_buffer 7KB 7KB [ 2395.048219] skbuff_fclone_cache 112KB 150KB [ 2395.048865] skbuff_head_cache 581KB 581KB [ 2395.049512] file_lock_cache 27KB 43KB [ 2395.050147] file_lock_ctx 7KB 7KB [ 2395.050778] fsnotify_mark_connector 24KB 24KB [ 2395.051481] net_namespace 143KB 143KB [ 2395.052119] task_delay_info 89KB 100KB [ 2395.052722] taskstats 84KB 84KB [ 2395.053344] proc_dir_entry 388KB 401KB [ 2395.053961] pde_opener 27KB 27KB [ 2395.054576] seq_file 78KB 78KB [ 2395.055199] sigqueue 90KB 90KB [ 2395.055802] shmem_inode_cache 1293KB 1352KB [ 2395.056435] kernfs_iattrs_cache 254KB 254KB [ 2395.057086] kernfs_node_cache 5611KB 5611KB [ 2395.057723] mnt_cache 204KB 204KB [ 2395.058390] filp 831KB 1462KB [ 2395.059037] names_cache 4530KB 4747KB [ 2395.059672] hashtab_node 274KB 274KB [ 2395.060317] ebitmap_node 1149KB 1149KB [ 2395.060930] avtab_node 4976KB 4976KB [ 2395.061589] avc_node 35KB 35KB [ 2395.062236] lsm_inode_cache 2775KB 3067KB [ 2395.062841] lsm_file_cache 134KB 180KB [ 2395.063464] key_jar 39KB 39KB [ 2395.064094] uts_namespace 15KB 15KB [ 2395.064712] nsproxy 11KB 11KB [ 2395.065356] vm_area_struct 1112KB 1212KB [ 2395.065972] fs_cache 36KB 60KB [ 2395.066592] files_cache 179KB 223KB [ 2395.067220] signal_cache 360KB 432KB [ 2395.067830] sighand_cache 254KB 360KB [ 2395.068464] task_struct 1056KB 1470KB [ 2395.069078] cred_jar 100KB 172KB [ 2395.069700] anon_vma_chain 271KB 303KB [ 2395.070344] anon_vma 192KB 243KB [ 2395.070967] pid 46KB 71KB [ 2395.071611] Acpi-Operand 240KB 273KB [ 2395.072255] Acpi-ParseExt 27KB 27KB [ 2395.072873] Acpi-Parse 166KB 181KB [ 2395.073506] Acpi-State 212KB 228KB [ 2395.074133] Acpi-Namespace 20KB 20KB [ 2395.074745] numa_policy 3KB 3KB [ 2395.075374] trace_event_file 176KB 176KB [ 2395.076001] ftrace_event_field 280KB 280KB [ 2395.076619] pool_workqueue 40KB 40KB [ 2395.077252] task_group 16KB 16KB [ 2395.077866] mm_struct 264KB 346KB [ 2395.078496] vmap_area 196KB 244KB [ 2395.079124] page->ptl 291KB 291KB [ 2395.079740] kmemleak_scan_area 157KB 191KB [ 2395.081272] kmemleak_object 134727KB 152042KB [ 2395.081911] kmalloc-8k 4752KB 4960KB [ 2395.082553] kmalloc-4k 7856KB 8104KB [ 2395.083198] kmalloc-2k 4644KB 4736KB [ 2395.083826] kmalloc-1k 2776KB 3456KB [ 2395.084489] kmalloc-512 3278KB 4976KB [ 2395.085121] kmalloc-256 1424KB 1424KB [ 2395.085727] kmalloc-192 540KB 540KB [ 2395.086356] kmalloc-128 513KB 560KB [ 2395.086980] kmalloc-96 393KB 744KB [ 2395.087616] kmalloc-64 976KB 1356KB [ 2395.088233] kmalloc-32 796KB 820KB [ 2395.088827] kmalloc-16 327KB 364KB [ 2395.089445] kmalloc-8 334KB 334KB [ 2395.090062] kmem_cache_node 47KB 47KB [ 2395.090663] kmem_cache 75KB 75KB [ 2395.091269] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=sshd,pid=248,uid=0 [ 2395.093085] Out of memory (oom_kill_allocating_task): Killed process 248 (sshd) total-vm:13688kB, anon-rss:1268kB, file-rss:368kB, shmem-rss:0kB, UID:0 pgtables:76kB oom_score_adj:0 [ 2395.187453] systemd[1]: ssh.service: Consumed 34min 53.557s CPU time. [ 2395.252700] oom_reaper: reaped process 11708 (syz-executor.6), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 2395.545236] kworker/u4:3 invoked oom-killer: gfp_mask=0xc2cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_COMP|__GFP_NOMEMALLOC), order=1, oom_score_adj=0 [ 2395.546793] CPU: 1 PID: 10284 Comm: kworker/u4:3 Not tainted 5.10.232 #1 [ 2395.547564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2395.548522] Workqueue: netns cleanup_net [ 2395.548983] Call Trace: [ 2395.549283] dump_stack+0x107/0x167 [ 2395.549711] dump_header+0x106/0x655 [ 2395.550140] oom_kill_process.cold+0x10/0x15 [ 2395.550648] out_of_memory+0x358/0x1440 [ 2395.551108] ? oom_killer_disable+0x280/0x280 [ 2395.551626] ? mutex_trylock+0x237/0x2b0 [ 2395.552093] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2395.552765] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2395.553442] ? lock_acquire+0x167/0x470 [ 2395.553901] ? warn_alloc+0x190/0x190 [ 2395.554348] __alloc_pages_nodemask+0x51d/0x600 [ 2395.554879] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2395.555574] alloc_pages_current+0x187/0x280 [ 2395.556076] allocate_slab+0x29b/0x380 [ 2395.556519] ___slab_alloc+0x470/0x700 [ 2395.556965] ? nl80211_notify_wiphy+0xb8/0x260 [ 2395.557501] ? __kmalloc_node_track_caller+0x393/0x3b0 [ 2395.558093] __kmalloc_node_track_caller+0x393/0x3b0 [ 2395.558664] ? nl80211_notify_wiphy+0xb8/0x260 [ 2395.559187] __alloc_skb+0xb1/0x5b0 [ 2395.559600] nl80211_notify_wiphy+0xb8/0x260 [ 2395.560094] ? _down_write_nest_lock+0x160/0x160 [ 2395.560632] ? nl80211_set_coalesce+0x18d0/0x18d0 [ 2395.561194] wiphy_unregister+0x147/0xb90 [ 2395.561677] ? cfg80211_stop_iface+0x390/0x390 [ 2395.562199] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2395.562793] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2395.563363] ? trace_hardirqs_on+0x5b/0x180 [ 2395.563855] ? skb_dequeue+0x125/0x180 [ 2395.564305] ieee80211_unregister_hw+0x178/0x210 [ 2395.564848] hwsim_exit_net+0x397/0x730 [ 2395.565306] ? __rhashtable_remove_fast.constprop.0.isra.0+0xf00/0xf00 [ 2395.566062] ? sit_exit_batch_net+0x476/0x550 [ 2395.566585] ? __rhashtable_remove_fast.constprop.0.isra.0+0xf00/0xf00 [ 2395.567336] ops_exit_list+0xb3/0x180 [ 2395.567772] cleanup_net+0x484/0x8e0 [ 2395.568200] ? ops_free_list.part.0+0x440/0x440 [ 2395.568730] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2395.569330] process_one_work+0x9a9/0x14b0 [ 2395.569825] ? lock_release+0x680/0x680 [ 2395.570279] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 2395.570809] ? rwlock_bug.part.0+0x90/0x90 [ 2395.571291] worker_thread+0x61d/0x1310 [ 2395.571751] ? __kthread_parkme+0x118/0x1d0 [ 2395.572239] ? process_one_work+0x14b0/0x14b0 [ 2395.572748] kthread+0x38f/0x470 [ 2395.573129] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2395.573643] ? __kthread_bind_mask+0xc0/0xc0 [ 2395.574148] ret_from_fork+0x22/0x30 [ 2395.574764] Mem-Info: [ 2395.575084] active_anon:34 inactive_anon:7074 isolated_anon:0 [ 2395.575084] active_file:32 inactive_file:54 isolated_file:0 [ 2395.575084] unevictable:0 dirty:0 writeback:0 [ 2395.575084] slab_reclaimable:7309 slab_unreclaimable:58021 [ 2395.575084] mapped:8705 shmem:83 pagetables:284 bounce:0 [ 2395.575084] free:2527 free_pcp:4 free_cma:0 [ 2395.578576] Node 0 active_anon:136kB inactive_anon:28296kB active_file:128kB inactive_file:216kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34820kB dirty:0kB writeback:0kB shmem:332kB writeback_tmp:0kB kernel_stack:2944kB all_unreclaimable? no [ 2395.581183] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2395.584178] lowmem_reserve[]: 0 1616 1616 1616 [ 2395.584723] Node 0 DMA32 free:3788kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:136kB inactive_anon:28296kB active_file:164kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:1136kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2395.587889] lowmem_reserve[]: 0 0 0 0 [ 2395.588359] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2395.589938] Node 0 DMA32: 485*4kB (UME) 137*8kB (UME) 52*16kB (UME) 6*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4060kB [ 2395.591539] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2395.592504] 153 total pagecache pages [ 2395.592936] 0 pages in swap cache [ 2395.593345] Swap cache stats: add 0, delete 0, find 0/0 [ 2395.593955] Free swap = 0kB [ 2395.594308] Total swap = 0kB [ 2395.594652] 524158 pages RAM [ 2395.595006] 0 pages HighMem/MovableOnly [ 2395.595455] 105067 pages reserved [ 2395.595868] Unreclaimable slab info: [ 2395.596422] Name Used Total [ 2395.597108] pid_2 44KB 75KB [ 2395.597723] IEEE-802.15.4-RAW 63KB 63KB [ 2395.598345] p9_req_t 8KB 8KB [ 2395.598953] fib6_nodes 28KB 28KB [ 2395.599574] ip6_dst_cache 41KB 41KB [ 2395.600190] PINGv6 31KB 31KB [ 2395.600795] RAWv6 220KB 220KB [ 2395.601414] UDPLITEv6 62KB 62KB [ 2395.602061] UDPv6 62KB 62KB [ 2395.602665] tw_sock_TCPv6 15KB 15KB [ 2395.603287] TCPv6 62KB 62KB [ 2395.603891] scsi_sense_cache 8KB 8KB [ 2395.604505] sd_ext_cdb 3KB 3KB [ 2395.605121] virtio_scsi_cmd 16KB 16KB [ 2395.605735] sgpool-128 59KB 59KB [ 2395.606356] sgpool-64 63KB 63KB [ 2395.606965] sgpool-32 393KB 393KB [ 2395.607584] sgpool-16 127KB 127KB [ 2395.608212] sgpool-8 86KB 86KB [ 2395.608815] io_kiocb 37KB 37KB [ 2395.609436] mqueue_inode_cache 62KB 62KB [ 2395.610080] nfs_commit_data 15KB 15KB [ 2395.610685] nfs_write_data 47KB 47KB [ 2395.611306] jbd2_inode 11KB 11KB [ 2395.611911] ext4_system_zone 3KB 3KB [ 2395.612529] ext4_io_end_vec 7KB 7KB [ 2395.613147] ext4_bio_post_read_ctx 15KB 15KB [ 2395.613810] kioctx 31KB 31KB [ 2395.614423] aio_kiocb 7KB 7KB [ 2395.615157] bio-2 4KB 4KB [ 2395.615764] fasync_cache 7KB 7KB [ 2395.616653] pid_namespace 7KB 7KB [ 2395.617308] posix_timers_cache 15KB 15KB [ 2395.617925] rpc_buffers 31KB 31KB [ 2395.618546] rpc_tasks 3KB 3KB [ 2395.619166] UNIX 286KB 320KB [ 2395.619773] UDP-Lite 31KB 31KB [ 2395.620391] tcp_bind_bucket 8KB 8KB [ 2395.621013] ip_fib_trie 8KB 8KB [ 2395.621630] ip_fib_alias 15KB 15KB [ 2395.622250] ip_dst_cache 80KB 80KB [ 2395.622857] RAW 93KB 93KB [ 2395.623478] UDP 105KB 283KB [ 2395.624103] request_sock_TCP 15KB 15KB [ 2395.624706] TCP 90KB 90KB [ 2395.625328] hugetlbfs_inode_cache 30KB 30KB [ 2395.626032] bio-1 11KB 11KB [ 2395.626637] eventpoll_pwq 23KB 23KB [ 2395.627255] eventpoll_epi 43KB 43KB [ 2395.627854] inotify_inode_mark 66KB 66KB [ 2395.628482] request_queue 60KB 60KB [ 2395.629099] blkdev_ioc 18KB 18KB [ 2395.629707] bio-0 372KB 372KB [ 2395.630324] biovec-max 429KB 535KB [ 2395.630928] biovec-64 519KB 519KB [ 2395.631546] biovec-16 78KB 78KB [ 2395.632161] uid_cache 8KB 8KB [ 2395.632764] dmaengine-unmap-2 4KB 4KB [ 2395.633380] audit_buffer 7KB 7KB [ 2395.634009] skbuff_fclone_cache 112KB 150KB [ 2395.634635] skbuff_head_cache 622KB 622KB [ 2395.635253] file_lock_cache 27KB 43KB [ 2395.635860] file_lock_ctx 7KB 7KB [ 2395.636481] fsnotify_mark_connector 24KB 24KB [ 2395.637157] net_namespace 143KB 143KB [ 2395.637764] task_delay_info 89KB 100KB [ 2395.638379] taskstats 84KB 84KB [ 2395.639005] proc_dir_entry 388KB 401KB [ 2395.639607] pde_opener 27KB 27KB [ 2395.640225] seq_file 78KB 78KB [ 2395.640834] sigqueue 90KB 90KB [ 2395.641461] shmem_inode_cache 1293KB 1352KB [ 2395.642085] kernfs_iattrs_cache 254KB 254KB [ 2395.642706] kernfs_node_cache 5611KB 5611KB [ 2395.643325] mnt_cache 204KB 204KB [ 2395.643954] filp 754KB 1410KB [ 2395.644575] names_cache 3731KB 4228KB [ 2395.645188] hashtab_node 274KB 274KB [ 2395.645795] ebitmap_node 1149KB 1149KB [ 2395.646418] avtab_node 4976KB 4976KB [ 2395.647042] avc_node 35KB 35KB [ 2395.647675] lsm_inode_cache 2646KB 3016KB [ 2395.648294] lsm_file_cache 134KB 180KB [ 2395.648895] key_jar 39KB 39KB [ 2395.649524] uts_namespace 15KB 15KB [ 2395.650145] nsproxy 11KB 11KB [ 2395.650760] vm_area_struct 1112KB 1212KB [ 2395.651378] fs_cache 36KB 60KB [ 2395.651981] files_cache 179KB 223KB [ 2395.652601] signal_cache 360KB 432KB [ 2395.653218] sighand_cache 254KB 360KB [ 2395.653834] task_struct 1056KB 1470KB [ 2395.654456] cred_jar 100KB 172KB [ 2395.655077] anon_vma_chain 271KB 303KB [ 2395.655682] anon_vma 187KB 243KB [ 2395.656314] pid 46KB 71KB [ 2395.656938] Acpi-Operand 240KB 273KB [ 2395.657562] Acpi-ParseExt 27KB 27KB [ 2395.658177] Acpi-Parse 166KB 181KB [ 2395.658775] Acpi-State 212KB 228KB [ 2395.659393] Acpi-Namespace 20KB 20KB [ 2395.660026] numa_policy 3KB 3KB [ 2395.660627] trace_event_file 176KB 176KB [ 2395.661245] ftrace_event_field 280KB 280KB [ 2395.661859] pool_workqueue 40KB 40KB [ 2395.662482] task_group 16KB 16KB [ 2395.663101] mm_struct 264KB 346KB [ 2395.663705] vmap_area 196KB 244KB [ 2395.664324] page->ptl 291KB 291KB [ 2395.664929] kmemleak_scan_area 157KB 191KB [ 2395.666629] kmemleak_object 132176KB 151730KB [ 2395.667288] kmalloc-8k 4752KB 4960KB [ 2395.667917] kmalloc-4k 8072KB 8072KB [ 2395.668550] kmalloc-2k 4704KB 4736KB [ 2395.669187] kmalloc-1k 2838KB 3456KB [ 2395.669843] kmalloc-512 3309KB 4944KB [ 2395.670467] kmalloc-256 1406KB 1424KB [ 2395.671087] kmalloc-192 540KB 540KB [ 2395.671699] kmalloc-128 513KB 560KB [ 2395.672342] kmalloc-96 390KB 744KB [ 2395.672967] kmalloc-64 975KB 1356KB [ 2395.673612] kmalloc-32 791KB 820KB [ 2395.674258] kmalloc-16 327KB 364KB [ 2395.674879] kmalloc-8 334KB 334KB [ 2395.675524] kmem_cache_node 47KB 47KB [ 2395.676165] kmem_cache 75KB 75KB [ 2395.676786] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-udevd.service,task=systemd-udevd,pid=11735,uid=0 [ 2395.679168] Out of memory: Killed process 11735 (systemd-udevd) total-vm:35752kB, anon-rss:10268kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 2395.723109] kworker/u4:3 invoked oom-killer: gfp_mask=0xc2cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_COMP|__GFP_NOMEMALLOC), order=1, oom_score_adj=0 [ 2395.724630] CPU: 1 PID: 10284 Comm: kworker/u4:3 Not tainted 5.10.232 #1 [ 2395.725411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2395.726391] Workqueue: netns cleanup_net [ 2395.726871] Call Trace: [ 2395.727182] dump_stack+0x107/0x167 [ 2395.727621] dump_header+0x106/0x655 [ 2395.728046] oom_kill_process.cold+0x10/0x15 [ 2395.728561] out_of_memory+0x358/0x1440 [ 2395.729017] ? oom_killer_disable+0x280/0x280 [ 2395.729544] ? mutex_trylock+0x237/0x2b0 [ 2395.730006] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 2395.730684] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 2395.731359] ? lock_acquire+0x167/0x470 [ 2395.731814] ? warn_alloc+0x190/0x190 [ 2395.732258] __alloc_pages_nodemask+0x51d/0x600 [ 2395.732793] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2395.733497] alloc_pages_current+0x187/0x280 [ 2395.734012] allocate_slab+0x29b/0x380 [ 2395.734464] ___slab_alloc+0x470/0x700 [ 2395.734906] ? nl80211_notify_wiphy+0xb8/0x260 [ 2395.735442] ? __kmalloc_node_track_caller+0x393/0x3b0 [ 2395.736036] __kmalloc_node_track_caller+0x393/0x3b0 [ 2395.736607] ? nl80211_notify_wiphy+0xb8/0x260 [ 2395.737129] __alloc_skb+0xb1/0x5b0 [ 2395.737553] nl80211_notify_wiphy+0xb8/0x260 [ 2395.738071] ? _down_write_nest_lock+0x160/0x160 [ 2395.738609] ? nl80211_set_coalesce+0x18d0/0x18d0 [ 2395.739168] wiphy_unregister+0x147/0xb90 [ 2395.739643] ? cfg80211_stop_iface+0x390/0x390 [ 2395.740166] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2395.740757] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 2395.741331] ? trace_hardirqs_on+0x5b/0x180 [ 2395.741846] ? skb_dequeue+0x125/0x180 [ 2395.742308] ieee80211_unregister_hw+0x178/0x210 [ 2395.742861] hwsim_exit_net+0x397/0x730 [ 2395.743334] ? __rhashtable_remove_fast.constprop.0.isra.0+0xf00/0xf00 [ 2395.744122] ? sit_exit_batch_net+0x476/0x550 [ 2395.744662] ? __rhashtable_remove_fast.constprop.0.isra.0+0xf00/0xf00 [ 2395.745429] ops_exit_list+0xb3/0x180 [ 2395.745872] cleanup_net+0x484/0x8e0 [ 2395.746312] ? ops_free_list.part.0+0x440/0x440 [ 2395.746872] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2395.747491] process_one_work+0x9a9/0x14b0 [ 2395.747999] ? lock_release+0x680/0x680 [ 2395.748451] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 2395.748983] ? rwlock_bug.part.0+0x90/0x90 [ 2395.749477] worker_thread+0x61d/0x1310 [ 2395.749940] ? __kthread_parkme+0x118/0x1d0 [ 2395.750433] ? process_one_work+0x14b0/0x14b0 [ 2395.750947] kthread+0x38f/0x470 [ 2395.751333] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2395.751844] ? __kthread_bind_mask+0xc0/0xc0 [ 2395.752363] ret_from_fork+0x22/0x30 [ 2395.752829] Mem-Info: [ 2395.753135] active_anon:34 inactive_anon:6948 isolated_anon:0 [ 2395.753135] active_file:30 inactive_file:0 isolated_file:0 [ 2395.753135] unevictable:0 dirty:0 writeback:0 [ 2395.753135] slab_reclaimable:7309 slab_unreclaimable:58027 [ 2395.753135] mapped:8705 shmem:83 pagetables:284 bounce:0 [ 2395.753135] free:2273 free_pcp:0 free_cma:0 [ 2395.756591] Node 0 active_anon:136kB inactive_anon:27792kB active_file:120kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:34820kB dirty:0kB writeback:0kB shmem:332kB writeback_tmp:0kB kernel_stack:2912kB all_unreclaimable? no [ 2395.759170] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2395.762131] lowmem_reserve[]: 0 1616 1616 1616 [ 2395.762673] Node 0 DMA32 free:2604kB min:7164kB low:8816kB high:10468kB reserved_highatomic:0KB active_anon:136kB inactive_anon:27792kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660456kB mlocked:0kB pagetables:1136kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 2395.765991] lowmem_reserve[]: 0 0 0 0 [ 2395.766466] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2395.768044] Node 0 DMA32: 327*4kB (ME) 74*8kB (ME) 33*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 2428kB [ 2395.769572] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2395.770572] 144 total pagecache pages [ 2395.771035] 0 pages in swap cache [ 2395.771443] Swap cache stats: add 0, delete 0, find 0/0 [ 2395.772079] Free swap = 0kB [ 2395.772432] Total swap = 0kB [ 2395.772781] 524158 pages RAM [ 2395.773144] 0 pages HighMem/MovableOnly [ 2395.773608] 105067 pages reserved [ 2395.774023] Unreclaimable slab info: [ 2395.774462] Name Used Total [ 2395.775128] pid_2 44KB 75KB [ 2395.775751] IEEE-802.15.4-RAW 63KB 63KB [ 2395.776391] p9_req_t 8KB 8KB [ 2395.777025] fib6_nodes 28KB 28KB [ 2395.777655] ip6_dst_cache 41KB 41KB [ 2395.778286] PINGv6 31KB 31KB [ 2395.778912] RAWv6 220KB 220KB [ 2395.779548] UDPLITEv6 62KB 62KB [ 2395.780167] UDPv6 62KB 62KB [ 2395.780771] tw_sock_TCPv6 15KB 15KB [ 2395.781384] TCPv6 62KB 62KB [ 2395.782009] scsi_sense_cache 8KB 8KB [ 2395.782617] sd_ext_cdb 3KB 3KB [ 2395.783228] virtio_scsi_cmd 16KB 16KB [ 2395.783844] sgpool-128 59KB 59KB [ 2395.784482] sgpool-64 63KB 63KB [ 2395.785119] sgpool-32 393KB 393KB [ 2395.785756] sgpool-16 127KB 127KB [ 2395.786390] sgpool-8 86KB 86KB [ 2395.787024] io_kiocb 37KB 37KB [ 2395.787647] mqueue_inode_cache 62KB 62KB [ 2395.788298] nfs_commit_data 15KB 15KB [ 2395.788907] nfs_write_data 47KB 47KB [ 2395.789541] jbd2_inode 11KB 11KB [ 2395.790181] ext4_system_zone 3KB 3KB [ 2395.790803] ext4_io_end_vec 7KB 7KB [ 2395.791448] ext4_bio_post_read_ctx 15KB 15KB [ 2395.792123] kioctx 31KB 31KB [ 2395.792744] aio_kiocb 7KB 7KB [ 2395.793378] bio-2 4KB 4KB [ 2395.794022] fasync_cache 7KB 7KB [ 2395.794643] pid_namespace 7KB 7KB [ 2395.795277] posix_timers_cache 15KB 15KB [ 2395.795910] rpc_buffers 31KB 31KB [ 2395.796553] rpc_tasks 3KB 3KB [ 2395.797188] UNIX 286KB 320KB [ 2395.797827] UDP-Lite 31KB 31KB [ 2395.798466] tcp_bind_bucket 8KB 8KB [ 2395.799109] ip_fib_trie 8KB 8KB [ 2395.799739] ip_fib_alias 15KB 15KB [ 2395.800376] ip_dst_cache 80KB 80KB [ 2395.801012] RAW 93KB 93KB [ 2395.801642] UDP 105KB 283KB [ 2395.802277] request_sock_TCP 15KB 15KB [ 2395.802908] TCP 90KB 90KB [ 2395.803544] hugetlbfs_inode_cache 30KB 30KB [ 2395.804215] bio-1 11KB 11KB [ 2395.804830] eventpoll_pwq 23KB 23KB [ 2395.805471] eventpoll_epi 43KB 43KB [ 2395.806112] inotify_inode_mark 66KB 66KB [ 2395.806747] request_queue 60KB 60KB [ 2395.807359] blkdev_ioc 18KB 18KB [ 2395.807960] bio-0 372KB 372KB [ 2395.808584] biovec-max 429KB 535KB [ 2395.809217] biovec-64 519KB 519KB [ 2395.809859] biovec-16 78KB 78KB [ 2395.810484] uid_cache 8KB 8KB [ 2395.811124] dmaengine-unmap-2 4KB 4KB [ 2395.811747] audit_buffer 7KB 7KB [ 2395.812386] skbuff_fclone_cache 112KB 150KB [ 2395.813036] skbuff_head_cache 622KB 622KB [ 2395.813658] file_lock_cache 27KB 43KB [ 2395.814273] file_lock_ctx 7KB 7KB [ 2395.814875] fsnotify_mark_connector 24KB 24KB [ 2395.815558] net_namespace 143KB 143KB [ 2395.816193] task_delay_info 89KB 100KB [ 2395.816823] taskstats 84KB 84KB [ 2395.817454] proc_dir_entry 388KB 401KB [ 2395.818105] pde_opener 27KB 27KB [ 2395.818706] seq_file 78KB 78KB [ 2395.819328] sigqueue 90KB 90KB [ 2395.820153] shmem_inode_cache 1293KB 1352KB [ 2395.820766] kernfs_iattrs_cache 254KB 254KB [ 2395.821581] kernfs_node_cache 5611KB 5611KB [ 2395.822222] mnt_cache 204KB 204KB [ 2395.822833] filp 754KB 1410KB [ 2395.823448] names_cache 3731KB 4228KB [ 2395.824064] hashtab_node 274KB 274KB [ 2395.824666] ebitmap_node 1149KB 1149KB [ 2395.825284] avtab_node 4976KB 4976KB [ 2395.825898] avc_node 35KB 35KB [ 2395.826520] lsm_inode_cache 2646KB 3016KB [ 2395.827135] lsm_file_cache 134KB 180KB [ 2395.827737] key_jar 39KB 39KB [ 2395.828357] uts_namespace 15KB 15KB [ 2395.828967] nsproxy 11KB 11KB [ 2395.829594] vm_area_struct 1112KB 1212KB [ 2395.830214] fs_cache 36KB 60KB [ 2395.830820] files_cache 179KB 223KB [ 2395.831434] signal_cache 360KB 432KB [ 2395.832050] sighand_cache 254KB 360KB [ 2395.832655] task_struct 1056KB 1470KB [ 2395.833278] cred_jar 100KB 172KB [ 2395.833908] anon_vma_chain 271KB 303KB [ 2395.834538] anon_vma 182KB 239KB [ 2395.835154] pid 46KB 71KB [ 2395.835752] Acpi-Operand 240KB 273KB [ 2395.836366] Acpi-ParseExt 27KB 27KB [ 2395.836967] Acpi-Parse 166KB 181KB [ 2395.837592] Acpi-State 212KB 228KB [ 2395.838208] Acpi-Namespace 20KB 20KB [ 2395.838814] numa_policy 3KB 3KB [ 2395.839432] trace_event_file 176KB 176KB [ 2395.840047] ftrace_event_field 280KB 280KB [ 2395.840659] pool_workqueue 40KB 40KB [ 2395.841272] task_group 16KB 16KB [ 2395.841882] mm_struct 264KB 346KB [ 2395.842500] vmap_area 196KB 244KB [ 2395.843127] page->ptl 291KB 291KB [ 2395.843733] kmemleak_scan_area 157KB 191KB [ 2395.844546] kmemleak_object 132201KB 151730KB [ 2395.845177] kmalloc-8k 4752KB 4960KB [ 2395.845794] kmalloc-4k 8072KB 8072KB [ 2395.846412] kmalloc-2k 4704KB 4736KB [ 2395.847034] kmalloc-1k 2838KB 3456KB [ 2395.847645] kmalloc-512 3324KB 4944KB [ 2395.848263] kmalloc-256 1406KB 1424KB [ 2395.848873] kmalloc-192 540KB 540KB [ 2395.849497] kmalloc-128 513KB 560KB [ 2395.850119] kmalloc-96 390KB 744KB [ 2395.850724] kmalloc-64 975KB 1356KB [ 2395.851365] kmalloc-32 791KB 820KB [ 2395.851999] kmalloc-16 327KB 364KB [ 2395.852618] kmalloc-8 334KB 334KB [ 2395.853235] kmem_cache_node 47KB 47KB [ 2395.853853] kmem_cache 75KB 75KB [ 2395.854470] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-udevd.service,task=systemd-udevd,pid=11733,uid=0 [ 2395.856589] Out of memory: Killed process 11733 (systemd-udevd) total-vm:35752kB, anon-rss:10268kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:80kB oom_score_adj:0 [ 2396.017847] systemd[1]: Starting OpenBSD Secure Shell server... [ 2396.022866] systemd[1]: systemd-udevd.service: A process of this unit has been killed by the OOM killer. [ 2396.027576] systemd[1]: systemd-udevd.service: Killing process 117 (systemd-udevd) with signal SIGKILL. [ 2396.043719] systemd[1]: ssh.service: A process of this unit has been killed by the OOM killer. [ 2396.051588] systemd[1]: systemd-udevd.service: Failed with result 'oom-kill'. [ 2396.067788] systemd[1]: systemd-udevd.service: Consumed 1min 7.280s CPU time. [ 2396.072426] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 2396.075315] systemd[1]: systemd-journald.service: Failed with result 'signal'. [ 2396.082390] systemd[1]: Failed to start Journal Service. [ 2396.083107] systemd[1]: Dependency failed for Flush Journal to Persistent Storage. [ 2396.086270] systemd[1]: systemd-journal-flush.service: Job systemd-journal-flush.service/start failed with result 'dependency'. [ 2396.099417] systemd[1]: Started Load/Save RF Kill Switch Status. [ 2396.102073] systemd[1]: ssh.service: Control process exited, code=killed, status=15/TERM [ 2396.103081] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 2396.109624] systemd[1]: Failed to start OpenBSD Secure Shell server. [ 2396.111584] systemd[1]: systemd-udevd.service: Scheduled restart job, restart counter is at 1. [ 2396.112683] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 2. [ 2396.113785] systemd[1]: Stopped Journal Service. [ 2396.134648] systemd[1]: Starting Journal Service... [ 2396.135428] systemd[1]: Stopped Rule-based Manager for Device Events and Files. [ 2396.136636] systemd[1]: systemd-udevd.service: Consumed 1min 7.280s CPU time. [ 2396.159143] systemd[1]: Starting Rule-based Manager for Device Events and Files... [ 2396.242613] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 2. [ 2396.243632] systemd[1]: Stopped OpenBSD Secure Shell server. [ 2396.271790] systemd[1]: Starting OpenBSD Secure Shell server... [ 2396.277183] systemd-journald[11747]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 2396.460385] systemd[1]: Started Rule-based Manager for Device Events and Files. [ 2396.504578] systemd[1]: Started OpenBSD Secure Shell server. [ 2396.531481] systemd[1]: Stopped target Bluetooth. [ 2396.731138] systemd[1]: Started Journal Service. VM DIAGNOSIS: 22:34:16 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff859807ce RDX=0000000000000002 RSI=ffffffff859807ce RDI=ffffffff856c1924 RBP=ffff8880485af40d RSP=ffff8880485af2b0 R8 =ffffffff859807ce R9 =ffffffff859807d4 R10=0000000000032042 R11=1ffff110090b5e5e R12=ffff8880485af420 R13=ffff8880485af3d8 R14=1ffff110090b5e5e R15=ffffffff859807d2 RIP=ffffffff811075d5 RFL=00000093 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffcaf678b28 CR3=000000002330a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffff00ffffffffffffffff00000000 XMM01=646d65747379732f62696c2f7261762f XMM02=00000000000000000000000000000000 XMM03=00000000000000ff000000ff000000ff XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=2f646d65747379732f62696c2f726176 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffff8880232bf890 RBX=0000000000000002 RCX=ffffffff85d44e66 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000001 RBP=ffff88806cf09855 RSP=ffff88806cf09748 R8 =ffffffff85d44e6b R9 =ffff8880232bf890 R10=0000000000032042 R11=1ffff1100d9e12f1 R12=ffff88806cf09868 R13=ffff88806cf09820 R14=1ffff1100d9e12f1 R15=ffffffff85d44e6a RIP=ffffffff81107e9a RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb4a1a71900 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f33923078e0 CR3=000000002330a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffff00ffffffffffffffffffffff XMM01=707465675f6c697475646f6d6d61705f XMM02=ff000000000000ff0000000000ff0000 XMM03=66207463656e6e6f6373696420646576 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=00000000000000000000000000000000 XMM08=000a0d732a2e25006c61746166003367 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000