000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000003e40)=ANY=[@ANYBLOB="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"], 0x1160}, 0x1, 0x0, 0x0, 0x10}, 0x6011) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') r4 = mmap$IORING_OFF_SQ_RING(&(0x7f00007ff000/0x800000)=nil, 0x800000, 0x0, 0x8010, r3, 0x0) syz_io_uring_complete(r4) readv(r3, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) fchmodat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x43) setresuid(0xffffffffffffffff, r5, 0x0) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast1, @in=@broadcast, 0x4e20, 0x5, 0x4e21, 0x7f, 0x2, 0x160, 0x80, 0x2c, r1, r5}, {0x2, 0x5, 0xffffffffffffff2c, 0x0, 0x2, 0x9, 0x3, 0x1}, {0x2, 0x6e3, 0xe55, 0x4}, 0x100, 0x0, 0x0, 0x0, 0x3}, {{@in=@broadcast, 0x4d4, 0x6c}, 0xa, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x3500, 0x2, 0x3, 0xff, 0x400, 0x5, 0x3ff}}, 0xe8) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010000000000000000002000000008000300", @ANYRES32=0x0, @ANYBLOB="d904770726de1555b395a5bfd375386b2ee9f39cc632aec7083ce4a24f0441c5477516ed2be62b6f27d1e2d43b45668c0256798156b8c30b8f57f585cd7d81f6b92e072269806bc58562df398e15313fd3c34c998fafecf07d81f2fd740c59b95c35735ee63184dc6e794e492c36462a1b53313725d9b73aa27e72258649fba9e60000000000"], 0x1c}}, 0x0) 09:21:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000400), 0x69, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:21:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000400)='./file0/file1/file0\x00', 0x1) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$ext4(&(0x7f0000000440)='ext2\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x5, 0x4, &(0x7f0000000780)=[{&(0x7f00000004c0)="204ea90cebdb6854075e5478aa73fc99b52c795e502af996bef74a94e922", 0x1e, 0x4}, {&(0x7f0000000500)="56695bbe15938cb9ede708019888cde92c551ebb84e81597a50c5a17feee8ef85c478b83261a7f3a7031e39568ddd98dde80b95a253825ac892306310636a286a8d3a6f81b1122b3cbc25bfcde16c842f4ec237a0b42c3e8f0cb2feb5f98fa8ed27bb270eecdda5c9d60fdf16c8395b87cbac7144744e931a5051209c4b085d68755c9030be91809462e7e1841478c67cfe78c279260ce76a509a53282bf9ab1d55b0896", 0xa4, 0xfffffffffffffffb}, {&(0x7f00000005c0)="07f674269a25ff9476b7f47a8f267b1d9fdfaeb10263eb860e05ec4ec62cf13e8d001aa9953bffcc8bdc3d5daef6382513fcbcc7e8973fe3ad4e22c671200fce4c37c9972ee155614af5a5036b6dc223e37ca43e08e123e690d49abcdc09d5222198207e437ed6d853973de5e6cd650379475228cc802428f47729cc9746a702df9e42156c333f8e7a3eec3397cec5f519c3e061305496cc2bac8bdccfdff8f23c56f8353b77421de8c846adde03cc965134fe5f962da84e4928d2364573093802ebba5707e7102126478171", 0xcc, 0x8}, {&(0x7f00000006c0)="a6fb4498679a206eec2fc44198cf67712dd817db286848ce5a5944f19da9a22497a42315d7e5552007d17f9a98b517780498d69ae07bfb12bb22e61e2e88e74f6eff0fa3d98c64cb9663fb7495aa0dc1590915a370bfbd34e5ed5c7da696798958aaec0e4758e7383cbdeada7ba68317e10b549d7d4dd79b34bba6d2e16afa737ec669520c15c2cd8c30ebbc474ad1baee98672dec41d7c48ea3d3e66b6aba1d38372c95fb34c622c7a8967cc5034d93370e53fb8ea7962389bbb667f5aceb", 0xbf, 0x7f40}], 0x820, &(0x7f0000000800)={[{@nouid32}, {@max_batch_time={'max_batch_time', 0x3d, 0x8001}}], [{@smackfshat={'smackfshat', 0x3d, 'pipefs\x00'}}, {@subj_role={'subj_role', 0x3d, 'pipefs\x00'}}, {@smackfsroot}, {@context={'context', 0x3d, 'unconfined_u'}}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$bind(&(0x7f0000000280)='./file0/file1\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0x400, 0x0) 09:21:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) symlinkat(&(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) mkdir(&(0x7f0000000380)='./file0\x00', 0x21) getsockopt$inet6_mreq(r1, 0x29, 0x31, 0x0, &(0x7f0000000280)) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:21:30 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000001a000101000000119a4276ea7f3bdfea337be3bc163227a20800060025ec68000000000000"], 0x1c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180), 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 1299.682822] EXT4-fs (sda): Unrecognized mount option "smackfshat=pipefs" or missing value 09:21:30 executing program 6: r0 = syz_io_uring_setup(0x7d39, &(0x7f0000000100), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(r1, r2, &(0x7f00000190c0)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r3, 0x0}, 0x0) r4 = syz_io_uring_setup(0x22, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r7 = socket$inet(0x2, 0x1, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000240)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000480)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index=0x8, 0x4, 0x0, 0x52, 0x5, 0x1, {0x0, r8}}, 0x0) r9 = syz_open_procfs$userns(0x0, 0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000440)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r3, r3, r9, 0xffffffffffffffff, r10, 0xffffffffffffffff], 0x6}, 0x8) syz_io_uring_submit(0x0, r2, &(0x7f00000003c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f00000001c0)=""/251, 0xfb}], 0x2, &(0x7f00000002c0)=""/161, 0xa1}, 0x0, 0x10040, 0x1, {0x3}}, 0x3) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r11, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) io_uring_enter(r11, 0x5ca6, 0xa972, 0x2, &(0x7f0000000040)={[0x9]}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x45, 0x0, 0x0, 0x0, 0x0) [ 1299.836192] EXT4-fs (sda): Unrecognized mount option "smackfshat=pipefs" or missing value [ 1313.915594] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:22:00 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1c1e02, 0x0) ioctl$CDROMRESET(0xffffffffffffffff, 0x5329) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x12, r0, 0x8000000) syz_io_uring_complete(r1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x77, 0x1, 0x0, 0x40, 0x5597, 0x3, 0x6, 0x697c, 0x195, 0x40, 0x1bd, 0x1, 0x8001, 0x38, 0x1, 0x98, 0x0, 0xcb17}, [{0x60000000, 0x5, 0x6, 0x1, 0x7fffffff, 0x1ff, 0x20, 0x800}, {0x3, 0x8, 0x7f, 0x0, 0x1, 0xfffffffffffffffa, 0x59, 0xc0aed29}], "4eb23587ea33bfd9e4630b84b5b073ca8c3f3750c3316f107c895247096b5acd486ad399dcfb1bdecc9b722735859931", ['\x00', '\x00', '\x00', '\x00']}, 0x4e0) 09:22:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:22:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:22:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0/../file0\x00', 0x4) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x10000, 0xc4) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x80) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:22:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 09:22:00 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000001a000101000000119a4276ea7f3bdfea337be3bc163227a20800060025ec68000000000000"], 0x1c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 09:22:00 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d, 0x9, 0x1, 0x0, 0xfffffffc, 0x2, 0xfffffffd, 0xb6cc}}) 09:22:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380), 0x20001, &(0x7f0000000400)={'trans=unix,', {[{@access_any}, {@access_uid={'access', 0x3d, 0xee00}}], [{@obj_user={'obj_user', 0x3d, '}!+'}}, {@dont_hash}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsmagic={'fsmagic', 0x3d, 0xfff}}, {@hash}, {@subj_type={'subj_type', 0x3d, '/['}}, {@subj_user={'subj_user', 0x3d, '$'}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@appraise}]}}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1329.568449] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 1329.570010] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1329.571123] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1329.572145] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 ff e0 00 00 40 00 [ 1329.573331] blk_update_request: I/O error, dev sr0, sector 262016 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 1329.575416] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.576871] blk_update_request: I/O error, dev sr0, sector 262144 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.579391] Buffer I/O error on dev sr0, logical block 262144, async page read [ 1329.582458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.583636] blk_update_request: I/O error, dev sr0, sector 262145 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.585747] Buffer I/O error on dev sr0, logical block 262145, async page read [ 1329.587477] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.588819] blk_update_request: I/O error, dev sr0, sector 262146 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.590926] Buffer I/O error on dev sr0, logical block 262146, async page read [ 1329.592640] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.593824] blk_update_request: I/O error, dev sr0, sector 262147 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.595986] Buffer I/O error on dev sr0, logical block 262147, async page read [ 1329.597677] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.598888] blk_update_request: I/O error, dev sr0, sector 262148 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.601006] Buffer I/O error on dev sr0, logical block 262148, async page read [ 1329.605116] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.606304] blk_update_request: I/O error, dev sr0, sector 262149 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.608421] Buffer I/O error on dev sr0, logical block 262149, async page read [ 1329.610521] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.611684] blk_update_request: I/O error, dev sr0, sector 262150 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.613789] Buffer I/O error on dev sr0, logical block 262150, async page read [ 1329.615506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.616651] blk_update_request: I/O error, dev sr0, sector 262151 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.618786] Buffer I/O error on dev sr0, logical block 262151, async page read [ 1329.622391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.623546] blk_update_request: I/O error, dev sr0, sector 262144 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1329.625670] Buffer I/O error on dev sr0, logical block 262144, async page read [ 1329.628521] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.629828] Buffer I/O error on dev sr0, logical block 262145, async page read [ 1329.631547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.632924] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.634293] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.635664] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.637043] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.638391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 09:22:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:22:00 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {}, &(0x7f0000000140)=""/49, 0x31, &(0x7f0000000180)=""/32, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x58) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x10, 0xffffffffffffffff, 0x10000000) [ 1329.695643] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.717182] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.718369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.719201] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.720046] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.720803] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.721711] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.725085] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.725885] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1329.726749] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 09:22:01 executing program 5: openat$binderfs(0xffffffffffffff9c, &(0x7f0000002a00)='./binderfs2/binder0\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r0 = syz_mount_image$ext4(&(0x7f0000000380)='ext2\x00', &(0x7f0000000400)='./file1\x00', 0x7ff, 0x2, &(0x7f00000014c0)=[{&(0x7f0000000440)="d8ecf34b95f31b150bd69d5a80f4981a7daf3bd84b0ba59e44ad10af6a0c2d6f2b68d26fbc08fe949a60f4e36672384cfcb93f7a47164b9edf27041722ea14fcb179860a507f92c9ab1265b0f22ef9", 0x4f, 0xdf7d}, {&(0x7f00000004c0)="fb320b46e5db9c682a2f3f55e41d442a42a23cfd9bf7315ecb0f986faf8e065d4ec88f4198302c0d03e13ec9674825dd794f5274d895688065c73ecaf813e989c8afefa44aadd3cf0a2b050d514b25c02ce7ccd40da9457265371305392e2d0ffb7c2af6865534c77e82c7de18af76aafad927a13966b9d4194ebd37f2827c66b1f8f1ff249602210b7885e3cc8b7fefbe71c37c6aa37f3e4df24e1af24d4408a246aea9168af6332a2c4809f3b508a081a8490773bc71ebc21b8dcc34bcea7d25be35109f4bda5027660fef1f907ee81be986ec67a0aa4f692b5c3fa592830c83a5a8d49a3af5a26ad6ff354766c58f18d9a83597f43e907b225d86a80fd8c2faf5c6732606fe4e2e79ddb15c217eb79ba446bca96bd93e694e705ae76478757b2437c6e5c2c0eb91710339a72c3b6fdc65cdbc869ce0554dc8603e6a78d40031b7379e4e7f860c5d0c1383637d6bbdbeed88d142d842f92c643c155e0e7565be3e86e6834715864b4cc35ed41f63cdb8bff7b4c5fc4a19b82eddb55f731b42d4e3988cdeea555abd4b90f2910221caf21d0f8b7e8ab3438f60110e9faf798758c86b51c42ab0dc2ec21062523cabb9d863ede49b4b3f253d2f7bc037beff0ce5e5c4be0d3b45f36fe7f40e25d90162763ec65bac941a013fa0ec7060ca84c456c0cab2dfcdc75d879b66de40b68ffa2006ca1bb697165c0d1cc44bb36cc9945a63637a856fe031dc1016799cb3e6761d7be95e8ea4b5392779848350a0cf8e6606b1732bd4d4acad26566fee81c56c59e2966f12e27bff65d9874ed887533f87fe4fe1b8381666609d48f307158b3ab024e631f5fa460267b7c455c1916c67efca336eaddf406d296cba2132a238b808fb3b22ddb5a5e095e3bb72edda7cb295480090e5f10a4dfaf6f744fe8451959227587122476bba22fb1689057b8bea79e1c259385259be6e946d625ac570a66f249c78fa099c151442c849907f4ba63603597439d013bda7040d9370ad68f9e50d86fe25c6105f412d1ee790a240b25a673deaf2afb52679c484b8fbe0b943351a3c35565f0c1450d5b6582c85bf3241ceafe0a6adcb40895525b801bb0c4b3da46bd637f75aa34c69dc4a3686300b34528b89aa69f4dd9f3668a413ce89ea77edf21814d6233dd70965fb01728e491101b731aa0885e5d6640eceb59d166c192f34e7d6f7c89188bd24f002dfd7862f77980d38f349747c456821773f48080c3586ddda871daabb9ac6a186aa17b4dc3fc121e49ea03751991d639f284a59176205862dc54657165b3461bdd285824dc9c5a6f0a853c8c7357f790671384ad702b305327b4c8523aba9cb70d02b2ee4f50b1fbf1090e861d7a09c68f44c03662eb71e7184e9cbec84ba6c078cf03ddd7e9965e87a21cdaad21fb0eab26c32d06af2bc75a5f244868ad223677567120ba16b005f063c3ad760380894d73f98952fb34b2be5d2097004155c7601c7f230026379127deaca8b4178022437e9a649fbad381ec56a337e8ca7c96e9893dfaa419fd1e5db33abd83ee8a6b2916daf4fdb1c6ec8c06492029bb0c23b7f3271d07caaba56b629a4a29f36c0a4e855f50119d627b1ee2d70ee01c8b9c246cdaf0ebda9b1b1ae33cbd01109b5234b16719773afd304609d0511d9e8f5eaf367d1586744bdbe432ba7f55f4e3c77490d35a733fabaa037abba7f8b8b400a73d828140a7161e472e876f2ddccdc6ea98833292018e9d465f026cc1d4a8e76e4a6e24c66be9d0f7bd2e4c1e3c9b8f15821826435f0bcac533543c9c05b242b769ce51492c42b0ece6461d9f4ec2de9d81cd637a719660afb1c507ca0aac987e07e759beea3ec1b3ea37a0d7d98860adffbadffb701893f22dc2cf7aa2809a464e9430e87e5a0e7d4ece4f80344a3a928dbc9f9e777f631f2f084808e96142b72c3ae7dffbbc31b9401eee82753b27d48ca70163b53e1b1b15a750e7ee96c47d4f38a478da38090a6cbcda756a5dc884b30459c00d6bd87d5ec0bd5350d0b27b19528724ea459db8946736a20a89e93015f81008c4e1ab587d4b465194f501c4fcf3dad3f4033aeeaab2700e8ad0280537be55d9ae74be8011ca310b87e5286865e6572eb42fc87749d42bfe981eab6c13dbd4551edeb6256d3e83ff545878b76da6e4c2adce064001bfc79483a629564c074e8c897f6a65b54870c83c05dfd140601cc42c7d9769ae37e281d3c12bdd4e3e4a4530c157104098fffc7ea9f12fa1cd92c991ce90360f086ff165a12bb1197b9ae01435a46d919736ecb27ac19103ae76a65e8d6fd6d2cc8e5b9972bec6a0a58dd304ae7a8ee9d71f2fd83c9b4443afa727ab5655e9c7ce5b786810da4307b3d85f5c6c146fbd94a594e2014741b2adb873cd2bb99bb80c549bddbc09c9460e4048fbc6d19401c480e1be2e31dc57330fdaa47a5d1de2c76539bdaf4397144d1568366f221db5a9929c8a16f494e0289a3074c99fa1bcdecb5196da19e9df7f5d822be465d247aae1ba8df6cdd1e929524890eac2e8efdc8488e32bdd098ac81a247e47d170fba9b88048945d66e8cd57e59297c688fd14665d8602e0785473022e42b9b3f67c1af9b73abb3f764b72f4a62f01c9043e9ca73c880dbf7337d810e1c55c93d38a4b9475b3b858858f7ac4c722c5229aa3bf2675bf8108435e6728e84cbf2d119bda8688f821f0b6ae0a647811d66254b69abee8a838da9b0f23ab17403f5873bc8738fdf8f26728d748ac46b95ad9532e0d14d9df1c93c50e424c3fe3203ad89400154e0d206326043dee3c052d8021b2e046f62ce5f2ce8358a6b508cf9562b543af53d0822c82dfc8c5ffa04f798eca801f0cea429ba7a939e8a79c5d46fe626a222c224955333c569437d7b9acfa398e5cec346726e3d9f932272a4c433034262e298df4e0ca0d55ac1e37a9367c337bb83350709985253e96f66a4127d8532e1fee42be6b466ebba1c64e1b210dca981981d5d61743521fc81374e5372632c29c0b9500b52d2a2c9abebfdb9c959351d0282bdd0e949ccdf75e468d3ad7e32477627b9f5248b37b3b4555d418db498e6c5a4a240f3ef4e84fa54968e6b2fdb6873d9299688c5891ed3ce5e065578c2c78aeaf24b370947228b08c6db87aea54f9d75490ada77374e89abd42f71da5125bbeb0bbe713db8200f2ea7fac69f8c2002f32c82a467e2a80421b6eb95d2110bc1764aad52446a828225bb4af37237015010e21944e5561bdb5c345e8ff0ac7060fd83c12ab417caf800eb95daebeba700b0a76437e16d9d3e6a1776a3607996febd8c18c051712cdd28d59b6ec25d608324a450589bdcf6f1bc009f2e4b72e7fb6c85c983ab5bc3dcdaaa3ed78b8ac52978893a8006cb46868fe47de1702c74b7f37620a3ff544410906914c984f4be218bc7943e761e4a389f60d1627fc4971fd656c17b6cbb5998dff19ca84e643459715899a4ab1f98e7eb7027d154fa4e31f3b421c90547983a29989b3ffa310922c5707ba32eb69394b85aef86c2a10dab9585cd40c1e9c5d3559ea5492f82bab43d0a162851e400a22c94cd46304b7bab8680d53396a1941c07163e275e46a1eb519dbd3bc7ce2fee17d3507dd344859f42da1f69290919190d60e2e8cff200503204b5216d93fb8a4ad8edb009ef5b09ce0fd34c6d6bd9eeca636ea1f79b6fd307df5445bdddd026e2206d8817c44e2f284e5fcaeb3a666fb6906f8555ed94aa1f01d9fc49159f4157757ae27070588970eaf8782099edb82b54188123d30f0c964183c0785915278b23d0d8013f77f3289560e792608eb1ddb1de569561c37c4abd0b276626d7bd7992027952d0fd51b6d2cccfc6a7a0d0363ee38afd7dba0781fe07f36ccef28437e361f57517338ce0965ac46f0d2b78fd8c086db9091835648baa5877749d1b30972c5ae115485f577efe0676d6de5438bbfffc2198be54d51c099bbcb475637a0e6cb6e925d18bdd9cd4c782e95a37b4f35afe2323e1fae84cb496a07893c5ed3dd1bd3af5adec5bf176f3d98ea22a31459f8c3c29f24e3651b43b2e156ffaa4b6f941b3035ce61eb43299b03f5ff5e12d13dfbf18145f12419344200615c3a415206032c54d922de12c8e14130d9f2ced4f66ce17710931d422d9e5bdd757d0a1f778fbbad2cd98af01d432a5373dfd2691933561c39c9879edfbc389514ab17cdf29c97d5c30021441b7822a02b268b86a8d0318f975dbf153d39a0c2e30b4b41f54b77135ad7da2a10747b1df82ed4cace6e93339bf5375d4d0e2ba46cad8ceef88325129ee8c26061614d10c7d0dcd3f7bbe156fb9b7f123a9250fbec9c4608c54f670cab109f6e60ee255ee9efb164d66e8f34896fb5840037d167e1291a37a1da031ce7680b68d7580654be96393870140f4aaebf6721ac7d7da30cebefe8ccfd7b8d578cf0b844addc3327710e2dd578855eeae83dbf0f967df2e77c932aae72344b7563931aabc4e3a20232487fdef5232157f97e3029921109d5878199d585629213f1905208f45beaca2bb3f43ef136a8ddaacedf5beb202cb195d6aaea8578491ebeaf843d9362af908da210234165d277c32db118acc226c5927e29adafe5ca16a5fd36a736d88c55984cc354327c77eccef01631a615cd86ba6be25ad2561276254b35c6730706c237bb62484e9f5cd74ac974d6d3cec8e86101046924bbb67258c84c0e951c5e0f407a8eb8ad1b1774bb010e952ddd5d926815c0bc37e1b7f292c551db011a88e7b9e9a113327b86632012a0e04e91e817c8090ee681688530169f578909eb62e6989befbae68960caa94d8a641fe5226ad857d99c67d59e0cc4b57a272e3c116e26b2331ce0a043fa0a3edc84a35e2ff0d60f64437e5ff1e71710dd7dc28c43acf9d17a6da8248785791cd404fa5b5b95159b480f6f27050ac8fde86a5fe12f8ac46714a6ec16be3a32c7d3c64e04bee9d1dfa8234fa63f0555d5e6a269edac19847774868f26f65d23f82ad4f3145e096fa7c4530fdfa94167bf0d695bf989ad59138515a0fe8fec0db41af20f081ba1ea05bdfed014625cf89ed4ed0983e9ff73e7b9d4aaa45314317df585bf57ff594a827fca2fc065ff5ee52173003bd58c6722e42f5f6b7dbd29e0125ff6a577367498d22438451a7f358084122d5f69b8e49c00bad7e85420bf28c9e9da05c80f2c91612f11e324815a17ae68996edf121c4d3e381b9c6efdc258b5b208962d4a886e641d1ffd87bbf56316348b080cb63a1e7f7852c8fea15e48bd5afb65992f8ce2ae77d9258c0476316171d13d82cca34370c084be11ed4877fd8ee852c8ac1dff1596eb379c21cd5d63a8b9e006e13251aead46710e387395ff88c363b323ab1e4d09e9214af7ed85f11f30edde89bd53d6b589a8bd4400471af88978bb2f84040e0a8dea1d4e9b81f1ae54ae989953fa390f64b29c258ab9a771bf20498c6d9d8569ca64caf90168152c6e3bbd97a61dd6a24697ad24ef6516c788ddc28fe8497dc68571e192f86fb685670d77bef1d6e120b3951c6538aa6767d0f647cac9e90525668e6abce90b375ef638051889bb5a1e3a2957ef8268accc45e6f14737ecf96629d39ef1c31423b6cc818dd734397196989660b7dea64364d6631fd4bf38f500e0d8090530a5d1c7466e4c31cb7c9d84f149f02541f0a5716703a85b247cdfd89612cae692c2af2bcb09c0ef6e510bf6373f219660a9e206f6d9d0ecf096a52cfd385825595103c2050710bd05158bf53e60a6c404b18afb7a8c82e", 0x1000, 0xfffffffffffffffc}], 0x1008, &(0x7f0000001500)={[{@data_journal}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x20}}, {@nodiscard}, {@debug}, {@delalloc}], [{@hash}]}) move_mount(r0, &(0x7f0000001580)='./file0/../file0/file0\x00', 0xffffffffffffffff, &(0x7f00000015c0)='./file0/../file0\x00', 0x21) syz_mount_image$vfat(&(0x7f0000001640), &(0x7f0000001680)='./file1\x00', 0x407f, 0x3, &(0x7f0000002840)=[{&(0x7f00000016c0)="fd5c14515f214f40d9760fbcae5bba273cdafc9c9a29c3aee80e6b6f5915f9af97579dea028a6c4a3ebbd081b73686a1c1c58d19780b8d1d5742a6c33c7f270166db9eba305a64862b87", 0x4a, 0x9}, {&(0x7f0000001740)="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", 0xfe, 0x40}, {&(0x7f0000001840)="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", 0x1000, 0x6}], 0x21c008d, &(0x7f00000028c0)={[{@shortname_winnt}, {@utf8no}], [{@smackfsfloor={'smackfsfloor', 0x3d, '#.@\"/*]\xe2/+.:[$-'}}, {@fsname={'fsname', 0x3d, 'delalloc'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_user={'subj_user', 0x3d, '!\\-'}}, {@dont_appraise}, {@uid_lt}]}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x3196818, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17840, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) chmod(&(0x7f0000001600)='./file0/file0\x00', 0x40) mkdir(&(0x7f00000002c0)='./file0/../file0/file0\x00', 0x140) rename(&(0x7f0000002980)='./file1\x00', &(0x7f00000029c0)='./file0/../file0/file0\x00') 09:22:01 executing program 3: sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) fcntl$getflags(r1, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x34, r3, 0x609, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r3, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0xff}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7f}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000140}, 0x4000801) fallocate(0xffffffffffffffff, 0x10, 0x0, 0x0) 09:22:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:22:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='./file0/file1\x00', 0x0, 0x201042, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(r1, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000040)={r1, 0x2}) close_range(r2, r2, 0x2) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) chown(&(0x7f0000000280)='./file0/../file0\x00', r0, r3) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1345.019376] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:22:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:22:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:22:24 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x1, 0x40, 0xcb, 0x307, 0x2, 0x3, 0x1, 0x51, 0x40, 0x1c9, 0x6, 0xc, 0x38, 0x1, 0xff, 0x3, 0x1}, [{0x7, 0x5, 0x2, 0x2, 0x4, 0x2, 0x0, 0xfffffffffffff1a1}, {0x6, 0x81, 0xff, 0x1f, 0x8001, 0x7d, 0x1f, 0xffffffffffffff4b}], "c4662b6aba34d7441b847eb44a91d0090693922cba11a2f5bdb3adc21f97ad8d743010e538228c5d67bf2b76a8816293617271dfa940a6345b8c32eecd87c2fe1869d08da17116", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7f7) 09:22:24 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x40049366, &(0x7f00000000c0)=0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000280)=0x876a, 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000002c0)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000d9f4655fd9f4655fd9f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="38d0c94eeae1faa8921e62bc7e519c82dfb5af5bf772feda73465a46a33690702ed805707eb2d908a6c7f03d102ee3e32ef8f95e52dfa511c5afb5cacee84d1137534bd29d2085753c6d90b4e3a21590316adb553d8bfd84a3a45c210adc9847bc9d44da90a3b479e497c992af5f1da9dd83395e97d6b2b24542b94faacef49b6205d36c"]) 09:22:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 09:22:24 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) io_setup(0x3e7, &(0x7f0000000580)) io_setup(0x5, &(0x7f0000000000)=0x0) io_pgetevents(r2, 0x1, 0x1, &(0x7f00000001c0)=[{}], 0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(r2, 0x1, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r3, 0x0}]) io_submit(r2, 0x2000000000000079, &(0x7f0000000380)=[&(0x7f0000000080)={0x4004800, 0x500, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0xfffffffffffffff8}]) 09:22:24 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000001a000101000000119a4276ea7f3bdfea337be3bc163227a20800060025ec68000000000000"], 0x1c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) 09:22:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$bind(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380), 0x876a670a2e27f378, 0x0) [ 1353.703730] EXT4-fs (loop6): Unrecognized mount option "8Nb~Qߵ[rsFZF6p.p~=..^RߥůM7SKҝ u', 0xee00}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xff\xff\xff\xff\xff\xff'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '@^]$!-}\\^'}}]}}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000000c0)=""/53, 0x35, 0x2140, &(0x7f0000000280)=@l2={0x1f, 0x0, @none, 0x80, 0x3}, 0x80) 09:22:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000380)='./file0/file0\x00', 0x2, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000400)="5cb50e0424fb52c88824201bacaea827b167989e2da0f2fcf880cd9ac512901b7a8a263c24213eec2e393597477b3dbb3c12d12ae2cadf8999affde9dd606d3ff1288c90d830e0ca9937ec89d5b3e06aeb25014cff62f21a0974d01975b8ac11a8bfa66eaa7f09b783d037f59d9133274463047c5cc8ee2092044443c66b7336d401848600b7", 0x86, 0x8}], 0x248484, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x5}}, {@mpol={'mpol', 0x3d, {'prefer', '=relative', @void}}}, {@huge_advise}, {@mode={'mode', 0x3d, 0x8}}, {@size={'size', 0x3d, [0x25, 0x33, 0x74]}}], [{@appraise}, {@dont_measure}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_user={'obj_user', 0x3d, '-'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@measure}]}) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:22:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:22:50 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000001a000101000000119a4276ea7f3bdfea337be3bc163227a20800060025ec68000000000000"], 0x1c}}, 0x0) 09:22:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:22:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) link(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000380)='./file0/../file0\x00') syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000440)='./file0/../file0\x00', 0x10) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) unlink(&(0x7f0000000400)='./file0/../file0\x00') umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1379.961657] tmpfs: Unknown parameter 'smackfsfloor' 09:22:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x2, 0x2, 0x524a, 0x4}) 09:22:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:22:51 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) statx(r0, &(0x7f0000001540)='./file0/../file0\x00', 0x4000, 0x80, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$nfs4(&(0x7f00000002c0), &(0x7f0000000380)='./file0/file0\x00', 0x8, 0x2, &(0x7f0000001500)=[{&(0x7f0000000400)="0d35a3db570b3ceee13ef94c8683392b64458fd7f3bbffc2c08c1ce533e0b68c1e6c47dd02c17d374bbc8cb018c1470ba6dbe33a5fc0a6b646c1a381d5bc1ab5d19de9a5fd3a2694659b4266ab44e97961737e341e67fd2d584d3ea4abca9d8d36c2c8701c77feaaba7aba3630fe9b2db8d0699503cd31abe875b9c6f5c320494e35601c4180e6e8ef72cc7d02658eeb431f3aed33e0e8b808de917b82334d354ff2baa9b8caa7891941c661b8b32c92b8a6d3b90af11c9ad87edae2825de79769", 0xc1, 0x7fffffff}, {&(0x7f0000000500)="2b7cc2359ce0d745e3573590f527569034829f036fefd0ce28d0cf92abd41e19bc3c8338aa7f60066354eca8770e4839fda92d33fbf15a9614a5343ce3da29996f1cb66e4cbb1e2584c062b3c14af2053a4b140ea8594711f437fea5229760ed2d0fe22c618427e37ed8f87c4ca3736fddca9d47fb7da3ee5621f59cd278e1298b830b6f6c189faffe56e4ee63b3253dcb2230447cd60236275e9e0a8dfe7a58b031bfb53e6ea7ac7a7481c536a51864f9c4eeb4ced32255619dbc48313627443da7e788c7658c14a0d35315816b6eef2a1f6a35029c3e0e836c131c1cb178f83fca4806637b6a935520056dc76d978d522d4e58f7cceb68717e5e5871d22728cc1ca0384aaa86a6c3bbfd75746e5011f60948af60524a37d7532962b48e3225416589d4a70cb0558b82a79cbe3f81ee67e872aaab2d6c8297bd151f0b427686d5ecb1e2ebc88c21613913c939002ac56b47ae04314aefd7883f65111ab0c915bccfe1cca2dc218ce2a8a8691bf156a2ff8e361ac34fb867c974f40a7b3d1e2b8d75e04f3433e34d9308b37a232a5a2590a7bc31307a4d428a556221dd44f21e8952a56a6fe11c920e1b199dcc4d8b973de41176425ddaef8a7c36fffc8261a415128535c075af068fc05d63ff78f8cbc61364023e990376b99e0e7aaae606b055d56454ae6410bd42a1d4104975ffb79deb95e593993d32037297041782e751c3832cea85af9d55fe754b90035a47e1efc2e0c08198dfe6c3043ce35e63e01c8ff96ed79ba47284250a33121abd6dc3a0c498d70af7ff6aff434d4e25d88148501f9c9f3c63d4403ba2af32b9e3c151685849987954f307de241a9b7fbbc155422d7d4be40990d32ebdcf5a397140fd975bd351bc72ab495db13a543e3a0b13df82c7e19924551bbbb51c6b19c4771cd4bba8db418ec9f7f3c74596554dc4ca42471509ec4f9fd203ec09236ccf4a2d699d604dc3b7f210ca0cc03c352d3ab8a6201072fa694059c783f882a370f23f6fb25a80b363630628855d30dbe0a1844fd182d01add4801cc9e8d722dcf24d2d38619e12ab09b371ce1ab610ec3cdafe85ca0d4543b46b7a78538cea930e7e116b137fbbda804fef2babd7cc62b9f8588d64aa8260dad80ba171abd4fcd530a3cfa2e7174d9b2f6f1382650c493b5ad8ee9cafb52758a558b05b115bbbc65d4769e77936c27cc45be9afa2105e10b8d6e0890944200fab6c3dc9a8f09cfcdb75e8addde9e2f416726581f84e96b96826221307a5e6cc836cb044df994c02972fc512d720f06a7edd9d1d528ae8f4a4d09859d94a4cdb02b3107917f967f132f12f14b4753db26271168fd24d336e406fc4b6a022ae443d5b87376db2d8ccf3947dd3ad4c2b3d10acdbc8e74c0c19b80b44f028eb496b1f60fdb00815b3605322c0b02b24a6720d2572fc06ab720eead2478f089c24643a953367f78ae995b0b93f9d2e2312f2ad034dd8534500bd5fcf49be7f7706daf94bf501ebcf4bff76598edd989412984661ec991c5a4557ea9dfa14edcd68497f598c54870c5c34a539824ce5d9590a78ec72209c897a30e2957a289fd42097ccaba092afe7b4dc2fb4f4ec9112c22e7bebbffc0f8f2eaeb5cb1cd61788311b46671596b3a41572f3746fbf83a715dd7c77a195273d11608799298f169d6e346e29089038e0b6fe1b2a6531d17e897d58e4f4ba3103a57d4555d8f3c3050e3af55e5e1c3379514347c61cf9c2675d52ea186f3c7b41639a0afbc0ebfd4f918ce8cc0ea27a73937de6f3b5d2b431d7e8ea4be547155ce1f0148794114ef01ea3924bf61522d39014d584b85c6b441b5570db61373b5a5e952012ba46ccd4c7288f2532c5f28a5424a44af4e1c9b5bd473d71a1c80fa9c964346361abdf3678a2b5105ab3bbf95c8285130f982798d71bcb3d644265734937332af39f82398db484e13fff0b3f97e8524db8f9d47a547086f857886f0291ad24bd19af7ef1fd9a2a2d5d5bc0fc546f42856df3ed5523507a59f98a92fcef704be2010f64baffcb262cc2b2e0e3036ea7e170a2b5d91a329047d8baa086f17fc4fbb37e76018e34d986beadbace0080f33df3a6eda5f914ad5ae0466ada22c96969d924afa923d0bfaa5d4ec5c753fab9c01e981cedba005a85e9512d5368485e7f5d9f1cf11cda9c0ac4fd307d4e14e1339c58868cb28114b8cbd8626631e074aa3b588f099848a0f802defa142752299df66782e801d7c56aee1a120ea40c2fe94b1dcd0320cca82b21a9edb30a2c86f5239cd085b875d8380c615f2df83764dc9218344bfd01b0fea56bcd5f18f9f072c821b2a52c3ac7c2c993440bece7b79c0c3870eb455dcc7bfa3357bb0217f6a38ab233919a440c16b669b616543efd4c9a5bc145ae92b9f6be8096ff3184a9ce2ef6e8bdc578a7a84d6f3c5b23e604221a1076e660e6de30ea789255532124c9e84491482ffa108972be2cd96cc64c00041b2f1eb13f7bc2e193fa804d263dc9196cdbc586a058513f847be727db83d35f25358b22182963262231e4518372b3a13f0da66e75bf90c4f600e5fa837aba375f6d84b7a7df62d50f41b3a979a691940dbfdc5c726110348e105dae224dfa89e3b71464faa3d41d689db58c9b0fe5cbff5f94fc0b189d7236f6cfa31ea42b16629cff395ac1ce5d2f34ff42cdbc1d28fd5c4f917ded2235d0b62be4491caab9950689cdab500a98cc1d98308132ac8dd5ee2e2272cf6e4409dd211f367b684f69e8ac345f5466ca725312a8d9420ce4b1e4a86179d02e3923f3d03664afad5db12076724a69e79758aed4437633bd2bfe8adb56f7df35c9498b33f287de4e6957368ee25a176de543ba7148bf4bba03f170427f2b99755d8490da0089084ed88e27db80bccd2b0410678f55dfcd0476150e4fbdb26ff21dc6a93354167f262227308bdb47fc6e4e7fc40166edc16e6114f556a964f2bfb94fd9648d12e38fc643b6e3bd0c1cbe6f0a45744857f26c82a6d16124cf809d253abc05fddb0a5d74d8e07c6f9815dd9ab2b444e4945240739cef5f704e139d96bf9576dfc777f765a7f6f4984275eff13fe4ed7e1de703124c7d086193163e24aacac194607a7dca4ad90eeacaade10821bce74d963b9f052fffa1221c8750d829a05b4a0da5d415190de1aa22787589f6731cda26e767df10564ca13a0d237aeb548bbbfb124fe59cd9c0291363d97910f48d4bf92b58f0acf8d0c2fe70ddd7ab6a0eb045fbd615d5471ee5292247f5e483c25eaa572735b14bed4428551a9a406b8b755a01e714fcfb7f269bf34a7ab01c0c5478e0576ab36f6085ebd17f2c6b5920d7b2edc5899023b6962537e453b3c0268acaec0cec92094d84156d4c32eae17d4fdc2b5181c821f3794e22a6bf671f0d89609ebb8c827f5ee22f28dad39b98aed85f5e899fd121a6f75fb0f89cd8733ef076691c0525844366f962aa6e118d831fcc0870e6c960e20305672396b250475ca446466d29efd51a036810280ef16005f1c14201a21f28fbe3dad4801d18e329062aded16168af5f8744ae4640226755e6d1a10cd59a23f7f134a5ff9873951ceea79015c3cafc42e881b7d3563213b3c7617ac2e9592d2027554b403abe02e7f242d0980a7da898b5475b7bf9c4ca370e57a4d85627be37be1ffc633914bf01a9072dd5afc8526705c1bc93f5f41e8422b749bea14251caad59c6c2d6ec91d0137cf1b6f9e292e23f9a8578e48dc0af9309b49b146d8a0a5130616caa6a374d1cd0a1669007dfb5e940406d589a7323f896b0d2cd1e5a96de9d674a97ad0f8c99cdbf9e9537db0bfa1f7a38764cf041e3f62f5fcc09315f83b7c1a4b385d5db02289b17b82a85b183a28c6e52b85e2266f1cb2f5d965f6d2fd0f2c2dc43e604583234eef0f19f771f7171941583f8ba910d8076d855f0f1c57735de2b2d90753cf9f3ed89ee0bb70e3f5940ba6a17f5976c71eafed2b5c6f0d999e9903d8fb9ff66769ab28a8b39b7783d64f08608108dd657f995ec27cb013ac151ef069ef11e7626c53ea2d8f844e19ae7c7b4d0aa13e8eccaaf7fe175dadf3add88734017bf8bb7f6a78215403b7b21623cd59cd7dbf992c6fe18c7bc0487807a0cb6ec7b06ba4f75d701b1b25f6bcab1d825df815ef3e59e620f2e6ba923caf08964feec04500174423da446685dc9d293b874b27a5f475fc25bddf043ee633e089cd7cb2de0e2c159198d46bcdfeaac8620d5a20663ba5339bba3d3e43a51e38d6031ceb1128e4daeac788e95faa49e6b7b2c4552e1d2161097f8ef38081e4a0744846f13ad12b5fb2bccea546fd5576bbe3d6c8dadd0bd5e6be1112e31c61ba101b6cc4bddd99bdac3ecb92f00f1a8eaf043817b417818b9db867f148bf84a8de3af1e3b5cb7c952454bbf1faf710174466c85c2bf730c6f529aca2cead1235b6cd1cf51b40eb0959bb2da0782a2811fac3707792a4e915fd4a23ca576cb6c204fbd8f2abc819d34a6a18cf36ff37a3ec6edfad2ab92959d85396fd25bdf03d6872788888cc98556c466343d65b7b0e497f921a35e1eb2c693f841902f2090bf3598983f6c164132553e0d8ac96747cbd94c6ac4e27c072ee313de872e3c8506bd6de272b7ca4a6b19619d242497ba8df0942a5571f55b6bf943572c0d453c4b6b07b6031280774deba3f2fea24094970796686532fceebf3c7b5092161498dd31994f9518c598e7d42d74b3ba9028c40f241dbe06fd27322a210c9a21d3ddfcc0f4abc3b020691a494295f086200dce769e301bcbd3801f43370126558dac3f14cb997fb6acfcea6b19a8f9863b9b8d7352692bd39efd834b62a3a3917c42ce9f56267dffc4f12bdb1e59b4d2ebcbe228504b6572a627795c71a2b7c4b1e280ddb80c70f970c148767d8e416d33a6c8a7314b71754768f5483a31036843403434bfa8ad6b54c634ebd433ccc1915d765c1d7481c223045a0a1132951b3363fea854432504584308d0a5734a51d004bae64ebce668463c5999851ac0ef25211f7cec988a56e63789003fabb4e5dfe8f4c02d72055a6242c32bdbe7d161d049216ec2c459480455f83c8338208cb29ab9b2e3afa35f7c0f549bb811af05ae2d98f5cdd5304c549bd3aab8b7073eb03f491906578d95c640f103387aae0ed0275252e5a1ed3e71deabec3d8b710bacf96a7c8149475073fb68cb7c37eacf91dcad443fae47056f69b17ff481b4953a57430220d177e6088edcb24a32e5bd1d79af91368ba81d4c086cc51b815238d63638ed538abbe3f5d023e330aa6922809f039a7682ff7035ed04b81231c3b5f952fc6b4c38d2fbfca49ae72889ba982db19d33db3821135f57bb0b9714929895722aeca326fec7a9f5d8424077df2955b69be26ec739affdacf0bfcdc28078a019c9189e8ff69909bcdb8141dfdad5869f1e9d586cde1b9ba497f13966b138b9ac127dd987a6c54f23490c1b0a566d11c958179556577da9d728c638dc4636b02c1e2d2013472597b0951701d4b45c7b0baa50cf196a0e1d042ca506372cee93672ef8bb4ae4da1d310b173cdf9195948a2af3bc16620cf96bdf96302ff28af865ebc161fda5342ca193d27c9eb39863271847bde481a84f12c81f483ab905caebe03dd152578b9d5b4b93d631d6efe5054af486c34168e0e03b3d9c3a3094be1e126603a2569e6dc928676bc5d33ff8c7f24291ba28a7ed287fb930dd5c96541fe9fd8f40bad73ad8b42cae5ed9547b164fe2e914206f98f26c45c081e502c01e6dcd3dd04c811", 0x1000, 0x4}], 0x40000, &(0x7f0000001980)=ANY=[@ANYBLOB="746d706673002c746d706673002c746d706673002cea2cc0215a2c746d706673002c212c232f2c646f6e745f6d6561737572652c6673757569643d61616563336334382d633030362d333700322d616634362d39653831633851302c657569643c", @ANYRESDEC=r1, @ANYBLOB="2c6673636f6e746578743d726f6f742c6673757569643d37316663616131392d613536372d336633e04533df2afeb1d2133efebd767f332d326564642d63613862323537302c66736d616769633d3078303030303030303030303030303030352c00"]) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$bind(&(0x7f00000018c0)='./file0/file0\x00', &(0x7f0000001900)='./file0/../file0\x00', &(0x7f0000001940), 0x20a04e2, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) statx(r0, &(0x7f0000001780)='./file0/file0\x00', 0x400, 0x8, &(0x7f00000017c0)) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1380.283150] EXT4-fs (sda): re-mounted. Opts: (null) [ 1380.284140] tmpfs: Unknown parameter 'smackfsfloor' 09:22:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000140)={0x10000001}) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r1, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x10) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xffff, 0x7, &(0x7f0000000800)=[{&(0x7f0000000280)="766e66c2267928c7b1b6ae34b04ce71e4117fafca626947dd06ed555f28a143183a16e1410cf68a7759f7f33139b989af1c5b80b6d1c419beb77a86890351790f348c632b26da078966877f54f2a6aa5de86539540557096675ee2243d23bbf35efe8b95a5f9945f3ec431829e00bb0e813aa9bcd400fa64a9198d38f90115912e340944e1247cf849c221b2d8224188dabfce02b21070d1cf338cc9b8381fb5f8b691ffa48cf2b6aa57d3d0f553db2761ca4e8252b12a7c007740c6b978c880609c9ee4e1154928d19b12cdfa67ea501d201373f1a73ac3d781d66ce465096a5abf8f6183f0029972aba4542e145fa28aa31c39dc64efc69e", 0xf9, 0x9}, {&(0x7f0000000380)="121ccc9d9cb35edfd485ebde5afecd09f0cfd2146b906302", 0x18, 0xfff}, {&(0x7f0000000500)="12b41b0da884a1daeb2eb788b6445eca67a1120a1e77f119357e5c11a46fcd14cce723eee93368a1ddeca4619982960ea6806c47692c1053e14b525dabe9b2bd082184badaa3ac664798a11ff92eb39474e2b7f81c6763565ef5a6c8e8c775e826cb930c42eee6d076c3", 0x6a, 0x4}, {&(0x7f0000000580)="231709ab5a35a825abb594d26bd9eb061657a2f17bcd0793ca929c03e361498ab29004332be0451b7af8ebedb6544f0758", 0x31, 0x5}, {&(0x7f0000000680)="4d80cf797216ebd79e682718d32beb2c98d2fbf6ddb4aa4c55d43b768828907418982eb8ccce038580cc1135c0832afafe27874613c234650aec76f6f61c295ee355ed4cfbd5c6bc246a8a373ef71549bce11cec113137a45126410ad1c48cc976e5333e615a041977870dc8dff3a59e8e8aca2f1546461427fd460fbf1b6853812c9bc3e0498c2547f7973b98b74f756d8d548692f8057468a6e56f30dec60215fc9f45ca2bcab805", 0xa9, 0x400}, {&(0x7f0000000740)="2b342bb2540389f38661c3dc03d69109416183b93ba03238af4dded95e79de536815359b4b7064d584a923f19e201bfbdffe7849603e9b57ad1388e22ceab807b558f74160d41f578999926aa5779e18f8a7fb378ff9c32dc59c35e9a2bde14781e40aa04bf51c7f8da4111ded0cde71f53d7eb873794e07e5ab48575b1d3dd1d14d6dc4849585245904ec", 0x8b, 0x7fffffff}, {&(0x7f00000005c0)="8c82e85d9da072f7946a259cceb5cd5c7265a00680d45f10932716b748073c2e514b1742ce7bcda94562365b4b3ca8bc1a947bfb780f62529f49f3bd9f29d2a0e9634e046235d55e6b17aa0bfab4dbf36558c3e3abf61a6d3c3a53c78c229083c7d789d337497256bcca14578a902a353d7fd312", 0x74, 0x8000}], 0x90, &(0x7f00000008c0)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x30]}}}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '9p\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_role={'obj_role', 0x3d, ':'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1000010, &(0x7f00000003c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2d62bf93a796c22dbdaea9089eed9b8a98367437f63e9213632eb381542d9e416089a399e220fcd3691faf65eef1bb376e03c3a35c12a75e02", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',privport,access=', @ANYRESDEC=0xee01, @ANYBLOB=',cache=loose,aname=[@(:\',msize=0x0000000000000007,fscontext=unconfined_u,rootcontext=sysadm_u,func=PATH_CHECK,\x00']) 09:22:51 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:22:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) link(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000380)='./file0/../file0\x00') syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000440)='./file0/../file0\x00', 0x10) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) unlink(&(0x7f0000000400)='./file0/../file0\x00') umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:22:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mount$bind(&(0x7f0000000600)='./file0/../file0/file0\x00', &(0x7f0000000640)='./file0/file0\x00', &(0x7f0000000680), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) chroot(&(0x7f0000000280)='./file0/file0\x00') mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) setxattr$incfs_id(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={'0000000000000000000000000000000', 0x32}, 0x20, 0x2) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mount(&(0x7f0000000440)=@sr0, &(0x7f0000000480)='./file0/../file0/file0\x00', &(0x7f00000004c0)='hugetlbfs\x00', 0x2010000, &(0x7f0000000500)='\xf2\xa3\x00') mount(&(0x7f00000006c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='minix\x00', 0x0, &(0x7f0000000780)='\x00') umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0/../file0/file0\x00', &(0x7f0000000400), 0x400, 0x0) 09:22:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) [ 1380.360756] EXT4-fs (sda): re-mounted. Opts: (null) [ 1380.416568] hugetlbfs: Unknown parameter '' [ 1380.571740] hugetlbfs: Unknown parameter '' 09:22:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:22:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:22:51 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mknodat$loop(r1, &(0x7f0000000380)='./file1\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0/file1\x00'}) inotify_add_watch(r2, &(0x7f0000000440)='./file0/../file0/../file0\x00', 0x400) fchmodat(r1, &(0x7f00000000c0)='./file0\x00', 0x10) 09:22:51 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1380.763937] tmpfs: Unknown parameter 'smackfsfloor' [ 1397.817285] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:23:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:23:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:23:17 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) fallocate(r0, 0x0, 0x0, 0x8800000) 09:23:17 executing program 4: r0 = socket(0x1b, 0x5, 0xb8) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000580)=0x1) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f00000002c0)='./file0/file0\x00', 0xfffffffffffffff7, 0x1, &(0x7f0000000380)=[{&(0x7f0000000400)="a216d4e0650a1bb7abdd41d3bb659845d42f67a41dd1c93d0ce17ae9c38d97b7821a8bb71e3ddc4460046cf4251711da0d3b6ac06e74f6426addcd646971805e4cd58082c499ec32951d9134998ad4b9ac", 0x51, 0x400}], 0x0, &(0x7f00000004c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@jqfmt_vfsv1}, {@nodiscard}, {@prjquota}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@seclabel}, {@euid_gt={'euid>', r2}}, {@appraise_type}]}) mkdir(&(0x7f00000005c0)='./file1\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:23:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:23:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/file0\x00', 0x1, 0x0, 0x0, 0x68492, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) umount2(&(0x7f00000002c0)='./file0/file0\x00', 0x6) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:23:17 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2800, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x110, r3, 0x10000000) syz_io_uring_submit(0x0, r4, 0x0, 0x1) syz_io_uring_submit(0x0, r4, &(0x7f0000001140)=@IORING_OP_WRITE={0x17, 0x1, 0x2004, @fd_index=0x7, 0x6, &(0x7f0000002e00)="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", 0x1000, 0x1e}, 0x5) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r0, 0x0, 0x10001, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f00000011c0)='\x00', 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r6, 0x0, 0x20d315) r7 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000140)={{0x0, 0x4, 0x6, 0x0, 0x3, 0x2, 0x4, 0x6, 0x3, 0x1, 0x7, 0xbb, 0x288, 0x1, 0x4}}) openat(r0, &(0x7f0000001180)='./file1\x00', 0x400a00, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH(r7, 0xd0009411, &(0x7f0000001e00)={{r8, 0x8, 0x401, 0x4, 0x8000, 0xffff, 0x10001, 0x8, 0x8, 0xfffffffc, 0x800, 0x9, 0x1, 0x4, 0x6}}) 09:23:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x0, 0x2, 0x524a, 0x4}) 09:23:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x1329089, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1406.586445] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 09:23:17 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1406.726916] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1421.393638] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:23:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:23:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:23:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="6d61785f6469725f73697a655f6b623d3078dbd14a303030303043d93030303030301930"]) [ 1429.802625] EXT4-fs (loop6): Unrecognized mount option "max_dir_size_kb=0xJ00000C0000000" or missing value 09:23:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x0, 0x2, 0x524a, 0x4}) 09:23:40 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:23:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) readlinkat(r0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)=""/178, 0xb2) 09:23:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001700)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYBLOB="b0"]) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f00000002c0)='./file0/file1\x00', 0x2, 0x6, &(0x7f0000001640)=[{&(0x7f0000000400)="f421aa1cae694e148dc594b9037ebf893e3c63b9c6e1de04032db58d1f87ffe23a9a7406d0397a8f3fbe3f8d6bf7144326061348dd0fa0ce80e81ae0ea6fc2d6595b948e3faf9f6b18fbb8b1254a599a684198a75a6ea8d546c7cc38f623a2b3f9b35ee06d60d1e6a18b5f4acf0b40133a7b", 0x72, 0x40}, {&(0x7f0000000480)="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", 0x1000, 0xffffffff7fffffff}, {&(0x7f0000001480)="82ab79078e34fa5b72ddeb5cebdc1acc2d4bd7743e96ceb763120278f4e21a11a3b86fa798c4b8fa2dd40032b68a8cdb8e0444b7aaf0acde234751c270ca2abf233cb80b6e94748a14952970a24b95beddf7ae61d9fb5858b92318c660ebea35306bdeb1e7f327bebe275b25c39f8357a83e163b70b41edefbe6f0f4a2766362a21245", 0x83, 0x49}, {&(0x7f0000001540)="a18a2cc8ec47f7c59f3fb2d121f09bbed107553021353663aad73a30f357a45f77aad94698af9e9a0d8b30d99daa0c15187a90398c151c3287b075431af7a987ae2774092f51c0c54a6609689f4c864eaa1450916977e12f7bb025ee2c6f51e78b78dcd852571003dbf7ff208e820e9319", 0x71, 0x6}, {&(0x7f00000015c0)="8c6874971342fe581de7f874c5381a89246cb201c01c3ee3dadc30fa7eb20d41b7e8ef40a7e56c6503e02120b474c07a41c31608e5645b1a6229cac13e3b143a0f8b9d8e", 0x44, 0x6}, {&(0x7f0000000380)="3ab3b20eaf1910aad90d017e6577e81b228646a6ea30e15fbdef5fb48c3e097b073a1e3d4d2d4934dcac01300f1329a0", 0x30, 0x80000000}], 0x8000, &(0x7f0000001740)={[{@jqfmt_vfsv0}, {@init_itable}, {@resuid={'resuid', 0x3d, r1}}, {@journal_path={'journal_path', 0x3d, './file0/file0'}}, {}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1}}, {@discard}, {@journal_checksum}], [{@euid_lt={'euid<', 0xee01}}, {@fowner_gt}, {@dont_appraise}]}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) getdents(r0, &(0x7f0000001840)=""/4096, 0x1000) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_unix(&(0x7f0000002840)='./file0/../file0\x00', &(0x7f0000002880)='./file0/file1/file0\x00', &(0x7f00000028c0), 0x102050, &(0x7f0000002900)={'trans=unix,', {[{@mmap}, {@cachetag={'cachetag', 0x3d, 'i\xff\xff\xff\xff\xff\xff\xf5ule'}}, {@access_uid={'access', 0x3d, 0xee00}}, {@access_client}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_9p2000}, {@fscache}], [{@seclabel}, {@audit}]}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000029c0)={{{@in, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f0000002ac0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) setresuid(r2, r3, r4) 09:23:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) [ 1429.872401] EXT4-fs (loop6): Unrecognized mount option "max_dir_size_kb=0xJ00000C0000000" or missing value 09:23:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) 09:23:41 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:23:41 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:23:41 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r1, 0x301, 0x0, 0x0, {{0x11}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001280)={&(0x7f0000001340)=ANY=[@ANYBLOB="14001eefe7cbd1c5b262103a5f60f018b226aa510212a079f09227c765171188f5113f00788764f04ab419f22e3ff937aeb6947b29161218293d2e83b8ca6351d410b3685410e7eb74eb05f1c5727134799e3f6667ba0c29794e80d4a093dd7b8409c97bf68f1c7aa1a87b24649341f7e94a5d281f2e4fd345afd203638bb7d33a40875bac33fe96e49003e6647146c189cfca0936fcb318864e335c5f3983be916dede5643f3058c868ca544b466af2288608336d7ac8715f4bc3b22d4e8bb3f4e41a468144d505a8f211bfc7017e965b937508ca247e3ac3eb291615", @ANYRES16=r1, @ANYBLOB="00042bbd7000fedbdf253e000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x24000004) sendmsg$NL80211_CMD_PROBE_CLIENT(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x20000000}, 0x840) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e) close_range(r6, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000240)="29113584a6bc16b113ef04a16f128bcdc8f9ea9997e52a7c140b0f4393828d3b9676636f4cf6946b2aa1a842bd930120681fcc8f3d28403a4af6f2b3f89a91611663b05cadb025a77c77f7d2ddfc50502ec7fae7d5a00524f3b37ce86fbbb331bde64115eea2be1a6013166063e253531d1b54417705e5c369d44d40f7101a43fdf94cd5d6e4affc8377b745083b5c7d92d5f93abfb372a892141c7446ff69045883f27fbef827158654a11a6e33271dae2dbaf835a8ffabbfdc1ea8218be6d9a539de261fee9da5072ecc20d69553c3c0cda7f02287623844957657aac4270bb32036d1b633c2e7fabf305453c22d113ec1f8f19fbcf88719d879a0dfa594b3e89558945b21d977eb36c7836aceeeab844066438e15b4acaa936f1d91aa82dd6dd6f0d418a911c9c7bd97fede69ee24d205e9100aad73ae36a45ab1bbcba9f0ffb1fa67831580b1a2b08765f74ab7f5e19928aa7933c524c034793f84e02b894cdb59c6bc721c0e9c83b72924648d0996bb9a5e4dee879e0e3f78cd40e36c551e7730f1c216d2a762820311121784ff3c1023f0676bdc17f5d742be665bafaa2b27eedf0f62a03ea956daff4e1ee299d18ca447f0f6553a345cd05c606d72f8080593e5937f99595413f035616d5bba23a7951ed96e4383ce4f72385180cecbc4e055e3e8eede0bd2753ec55a7e364e98d3c1ebbf5ce0d1507fd6ce5ab22aef4407f0a52f00a61a3ce5d7a9ee271ddd860c4faf0af807960482ea05a3d63c07e662317f9a3da3d81073e868cffd3a75d36a634b7a0fdcab633787476df27006a7104fce1adb2b30159a5d6221b25a6730e92abaafc8ca8705c016212745e3d1c28e6eb6292b0262f8e107171dce678fe4d914c5d5e85210adf3833775f1ace6ef3019acc64aabb29f247ff92be654e15ab23fb7827fa9d3c8caa2cfa05040c43a860616a360066d780b3bf21a140bd452a79ee6b1ed5ff08fd71dd4e724bfe7bec540213060b2096cf24311724e0f30136818aa45f662edad712e4576d873417d8c7be35fd17e5ec7cb49be0d28647ec747570c29f1293b88644b38001a32a9f72be8dd5f065b4ad6a903c84d19ab5104cb5b92c09d33cd38ea1392a124cf1c8846e96d582c83ee6fa9bbc82cc2c5daaced91fe9f71d2f79cd1419058f2859dad1700daa225d303b61657be19232632eea2cf80236d9e5842545b5554c16e53ef49c2a35b8f6d5e3aed556eb68366bc48aec4363993f9f10d7c226e5bace41b3b8f6d83e36792d4ee1bca730b8d9bbeafb7eeb0aba4b49ad67129690a3594c790905699683d4b53c4c77c9c372466c075dc378d7c9aaabe635aa4639d9447d1f912dc172536cd8b7adbb3779aa497dcf65b48f74a55c43f1302aedd70bf3d97ce22a8dac0189ec46fb082415cfad8af51a17ce34f3ce97435098ab01abcd390a5b626676fc92fd29163649a57e2b403369c73d9d4b54090a6a7056335bf12b35698b0ee1159f787e029207400fddef3c31e64c3db9baf523de1e20d48fb8d89ba02d079ec7e7da46cda979b0e8f401d706f03bf3683f724828de4b17143136a39df48fe80c988da3e19fd4a7d719ef45f3ef8cd9b632572e125f3f845f38a4d1f7a2d5f73dd6c0a64f6e5f16c9521b8869fdae792bf12f60b756238667b9443ceff85088cd6d5c93434d44a1b649dc4b1ba4b066132c45013dae9a4e11af5294fe49360b97ffca39f6b72c23204232cab0dd7b2ff78467b7ffd132868468a860c0f070e41f607646392fcd9c4c5a1984a0dd92a5a6aec668f118022929dbf123657b8204455a9627f71fca4c426912538449cd854cfbabeaaaf374bbe16ca72c976bda33986bfad83e9b977b245f0251b6f42f6e57446a4f80f6e974d733e5b803f02c3955af9761e87a0f036ad7954d0120efa6a15b90509b81298b640393848594d62c591cecdcd865532cb1c9517369571089cb497c0c551ac9f6e4d8e263a49ac51f91f51941c9dee1fbb0ace373ab078ccd146d408dca6863ee3f133cfd086797d0d66c2c90d63347b5b8dae82e59d7fa8762b2f171d9089280b8ab78d0d745da695cf91ff3e6849a02748d73dd7141acdf4b3700a20c1d9ce6e17205fbb1890bb19924c35964a711eb603043a3dfac0b2b3f591ded58dfc060e598c3229a1a74268a5bdb12d0badb746f85d35ef6de434baef140dbc24d499390cf78a38145bc20e225a349a5d26d2ef55f3c1cd116e08f9fec6d2b031c72937f0ddbe48c34a020f8338b5557b50cb9225228ffdfd2351007ece2f80a838baac093e1f0bf7797ec39ae84b696d52697b6a446fd4bc32211806227474d3ea8af2ddcfebafe6848361943b78eae6c6ad9c4d4051459f0c88eca9718f76feaa371a489488390b2a654b4eea41e3734195cd240fa43ed345af01048a4556f215a5bf6ff8e7612e9cff72ff056d301bdb0799a97f17cc0641f809ba41732431618e93b296f7b804748daa60bdd50005b345648fcfa6fe9600237a2c8858abf982d8994a47d339c2034d8888bfc612a9d7176aac1d3eec74a708752cf6d08c17af8fd23c21ad1983ce9eb3b792b3782fe6079e5d39a39710c65b3a559ed932ad778f197adbffd0d520afff00622a65ac0a8beed98827cc22eea46dfce9c8c7d59ee268513858e7b51d68a7aae04ea07c4cfde13e2f7663a7cfce4d7d5892faa1b8118045dd0de6915f6ca8d7b3a55e2e4a9dd0e303eb5bf2dd69f7a8383487587d1320dba9c1914763a2e2e61f8f1617eee1e5949d659a4805957a0454f3faf60bf8d5075c58fd8b350b41cfd258cbab24e0c254862e7dd33638b309c0cbbfddba4a5427d0ba6078573b185b4f5d1013511c9961ead0a731d145d37f699a7b86439736975ea02c77140d8a3cf596bcdf74de6547cd2c70b86b7a78b79fdc569cd2e2a222392bb24a1b3cd8072c3539d5b7d7d8a979f8c13350c35124c2b27551fd551ebebcf5bb28cbe0ee878a3523a4cb3c931eb419fa9188d3a590df38b761b219e47b0bb1c87365564a2aad17d4748de4dac68628c6cce9d857bbb79d7375168609d8c8678abf6adef0a8b2f3f02173a8667307ab1f549a596a6fa964d62557828dada24baea5f5eced305e8eb0d7240f39436aa6beb4986321b1159f374ed29beb23b4a85d14c7c92f6350bd604c6086621a7731142fad4e116444472bb63617bd923f3615015698ccef82aab1868a5797957916596d0044e489eac55cba4a6c652eea24dbd2961c93bec04d0dbd1b11bb463b9d737227151214814c88d185334d5e2f2f5a0db8de797e25d0f831a36b8c21390532f34325f7197a51679a634b896ea032fc35c1fb240ff9c2b8289761e4ee65bb8cbb4c450c77e0352ea67c6586daf1eddbfede115c6556f1e28e791dc502b9f826707cda8341fa392e83045f20fb739fac956a9d8fe96e30cd597db4e3437b6078511aa5338f81e4a076b18d224273d7803f049959cd990f10e1b1465c16d46e6e9d4a62e8d6f825644eba8c60729c515cdb1d400d0200b61c844bb3d91a9917502ce2154688f64b5e195de0cc3f285dc3749c5525c509a275765306fac07d9b28f26b4d40052409032e99ab3240560a5dbd10e32a041901dd4b9c2f000393856de1671121e7b2ba4319b5f118189e3828a97e68e5e56c4df7acb24888d38cad0291466ce73949e5aeb27bf8935ddb9a7e8a2e5b8046778a64b8b6fcad743e4863cd7a957a8da97549fcbfcdf9438e9133a0c9d682010d9c15a384e2ad540762a6477856c9fb41ad8eb4711b3fff2e6b4342ac54e1b076340ee65bdc099af335d3fc58bbc2519ce481cbae9c73a03837894331082dbec4a5886cb244acd75b6e690913aa2a39055070c3fa96c268c89de2d3f4948c96eecc9af1339453e79a631d45b374fbc59f732b320a558ca28224d7bb0ad3bdf97be66dd2c2c454d3ea47b25dcd06c5cf29e0c8cdf9e1b49d0c2c401ddf587d9f94d4e1273ed3ef9de715bff621319540a3514fafe68752b4acf09934aa977471a41307a3a0170c8f49b368d5f78fcd292c98032ec46fdac80aa1ae5829135b69e3fb6b3809138e0d7335087fce13e56a0cd445ae241c2a97981a1bf9e90d543bdab733650d7b1434e002045ab6dceb044d956e9ad7d140dd83626f5e25f1d5eecc3ade3220fe3d7905605f8667a46e5c01ddce7131e54baacdef6b95f77ccbbc14550c192d938ad85bc4f2d5893d800df3f24b05d2391e9dc5376c471a6f0f802be7dfe9e1bf987c61ef0d5fad77d687cf1d509e51548fc78746f888e3435e6af56dcca8e6ee990802fa75f1613e623fdd1c5c1e60e507c8ab6b87b7f727d45ede3ac1791455f8880c7ac98a7fc82f75c5f8229bb49e458bee43f1dc362f3395f6c0d59b62c0a1ecccfc1d7c49f11f6abc032d65846d5734ed0c27042b1d55d6cca20e5634bf305763329419a56a188073e62a04e43b54e517d0f31863f917fe6be91fe1de251fbe1d05fc820a0bf506f61ed1e8562694b26d08ac82c39cc15751454220e25fa5cc8a85f3b6cb0d2a1ed37aec5a2ab35b191483ea8ee2e7eae6e66696856edf5989f230bde52b720a75315d51cce626d7196a8f65bcac0b3f8daa0895d0e77f8d25006b7fe59ee36b512db99c510521bfc6e8a431bab48f284cbbde03ab7a5aee83fc5a435144a595fb4e77387b445a8ed13f8b3ea7fa8efc26e466880f620cbc623615749a612160d9af4ffebb0fd6bec026ee4ebd1f0c5e1d425fe9562f0785e0ee0c89a55132f4d30822f2e0f1ee622410a3b8285006ea9b502ad6ef2ad941417ca06af40bf0ec7fb7946f0738e95c3c83a35073722209ac55540e68d8d3d83cfad7c71449f83abb4fbb99066830dacbafb739a61a7f7c991afec1710063b6de65d6dea31291c5eef055730690bc27af6e39de1cc927770e1a3eb3f66eb8c1ce4e1c03b9a1c752f7bb2c15baa19976f1a40d2aa7f37fade52d64c35f48fb5bb71c6eea1b98970f8d2218a36da1275d118870caa4d673d2388b0cebbc4f429ac427472a985e22eb292a8a503590c504bb7367f03bce0f61a9505b90660fcf32ea963261c7e57a9cf019306b5a4981aa819aa35d8e0971a18bc18e39df7ba8531fb0334dfc35f5942e3a93fd3baabfce0c26e7956de8af9ce940d5cbd9ce8af7641f86951966b345c8b7ad4836d531a1edad0457611bdf4fcbb9780e835d307168b74c2ed03ca198cea578efc2071d5ec77febb4fe437c8d317b2557fcc70a1da7c8cd33839739e9399d476346df5798a4eb8dda0ac067679290ffaca8c6c0148ae202538386e1a7eaf444439732c29dd89f423566b3b8c6bde1db0ef3e0c15894f6a09034b2e886a403fe4d1986ddadc8c0c8f1aeb859ef61d3643886cc47f4e8977b2695b20192a5b277671670ab5cae4811d50c804909d290c00fbe14e94ff7ec304d1badd8859307a127778ce6e99d7afbee0dd3240846f9af0053dad7a7aaed1988fc7275c2cf455ee03e013a6f3bc3e1ed028b5d42500c3e3e78959842ca676a38d9127eaaea61795110335d5c36f05d2d90a863d92a2e40bcaa429194d802219eb9827cb9fe1ab8341e5a1bf19857060a4ddc9abfdb2d8ece1ec98cfd4dd409900530384f95536d0649ea292e2d4a80f5848a82d53a6373378d1f209915445681e6fbade71f26ff07e49123fd972e3276c5a6908efc3f02ac1b6b0aff98b066577e5eed7316797ae17724ba8c084b3047aab42f82a0a2c4704d7d3cbb139e9f6b043f7e47dfb6476bc843f4f6632175", 0x1000, 0x8) fallocate(r5, 0x0, 0x0, 0x8000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) r8 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000001240)={0x0, r8, 0x4dd, 0x1000, 0x4000000}) 09:23:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:23:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(r1, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r1, 0x2, 0x800000000000000, 0x20000000000004}) removexattr(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000480)=@known='system.sockprotoname\x00') close_range(r2, r2, 0x2) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) chown(&(0x7f00000002c0)='./file0/../file0\x00', 0xee00, r3) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000400)) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:23:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x200a01, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) umount2(&(0x7f0000000280)='./file0/../file0\x00', 0x8) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2b429, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000380)=ANY=[@ANYBLOB="0100df559dc000010000db6a", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0/../file0\x00']) setxattr$trusted_overlay_upper(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0), &(0x7f0000001a00)={0x0, 0xfb, 0x29, 0x4, 0x4, "5d57d647b2a5cdca1057f16a8237eac3", "d98932dc724069d207977fe0305a3df42a70485e"}, 0x29, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000580)=@hci={0x1f, 0x0, 0x4}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="b221e51463d3e0fb9cf030557da92aa257a1423554e9b3324c93025ae81046cff5183f3c051a874eb2d7f2210c22f8913a973a6aa95a4d38650d25c05bbd2740cd84f7e3558fe62fc2498d819aa9f58c451d38c4e80a1e5c6d860da417c65398954dc42af0b827f7b2db83201464d9cdb7f5b838d0e59c40b0e198ded670fef860e011e5835f907f253e7cdcd0c6dd6dbc6a65d9066a7c3d8e97c3eca32c390d1e29fe7bb04f3f2b4fb2a5b30913a7eb5c50f92357679124d27a72892fdf7cf2919c7b11696816b96037efd548324c0c147b22f09203b31440710ca1d67a04b596685f3589d9f886c4", 0xe9}], 0x2, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x1d0}, 0x800) lsetxattr$security_capability(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500), &(0x7f0000000540)=@v3={0x3000000, [{0x9, 0x1}, {0x10001, 0x7}], 0xee01}, 0x18, 0x1) chroot(&(0x7f0000001a40)='./file0\x00') symlinkat(&(0x7f00000002c0)='./file0/../file0\x00', r0, &(0x7f0000000400)='./file0/../file0/file0\x00') umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) unlinkat(r0, &(0x7f0000000480)='./file0\x00', 0x200) 09:23:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:23:56 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:23:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:23:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x3173408, 0x0) mount(&(0x7f00000001c0)=@sg0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000400)='xfs\x00', 0x10040, &(0x7f0000000440)='tmpfs\x00') syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:23:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:23:56 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001440), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r1, 0x301, 0x0, 0x0, {{0x11}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001280)={&(0x7f0000001340)=ANY=[@ANYBLOB="14001eefe7cbd1c5b262103a5f60f018b226aa510212a079f09227c765171188f5113f00788764f04ab419f22e3ff937aeb6947b29161218293d2e83b8ca6351d410b3685410e7eb74eb05f1c5727134799e3f6667ba0c29794e80d4a093dd7b8409c97bf68f1c7aa1a87b24649341f7e94a5d281f2e4fd345afd203638bb7d33a40875bac33fe96e49003e6647146c189cfca0936fcb318864e335c5f3983be916dede5643f3058c868ca544b466af2288608336d7ac8715f4bc3b22d4e8bb3f4e41a468144d505a8f211bfc7017e965b937508ca247e3ac3eb291615", @ANYRES16=r1, @ANYBLOB="00042bbd7000fedbdf253e000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x24000004) sendmsg$NL80211_CMD_PROBE_CLIENT(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x20000000}, 0x840) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e) close_range(r6, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000240)="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", 0x1000, 0x8) fallocate(r5, 0x0, 0x0, 0x8000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) r8 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000001240)={0x0, r8, 0x4dd, 0x1000, 0x4000000}) 09:23:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/4096, 0x1000) 09:23:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x0, 0x2, 0x524a, 0x4}) 09:23:56 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400a00, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:23:56 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000480)={0x506, 0xded, 0x326d80, 0x20, 0x8001, 0x8}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000780)='#\x04\xff', 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000200)='./file1\x00', &(0x7f0000000280)=[&(0x7f0000000240)='nl80211\x00'], &(0x7f0000000540)=[&(0x7f00000002c0)='nl80211\x00', &(0x7f0000000300)='nl80211\x00', &(0x7f0000000340)='#\x04\xff', &(0x7f0000000380)='[/.(\'#.[{$\'+}%]%\x00', &(0x7f00000003c0)='nl80211\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)=']\\,\x00', &(0x7f00000006c0)='^*-\x00', &(0x7f00000004c0)='(!\xaa}&\'[,\x00', &(0x7f0000000500)='nl80211\x00'], 0x400) ftruncate(0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000700)=0x4) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x9}, 0x0, 0x0, 0xfffffffc, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x7, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r2, 0xc0109428, &(0x7f0000000080)={0x1}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) execveat(r1, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000600)=[&(0x7f0000000180)='#@\x00', &(0x7f00000005c0)='&\\*([\x00'], &(0x7f0000000680)=[&(0x7f0000000640)='\\,#$\x00'], 0x100) dup2(r4, r3) dup2(r3, r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) 09:23:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:23:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) fspick(r0, &(0x7f0000000180)='./file0/../file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f00000000c0)='./file0/../file0\x00', 0x90) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:23:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) rmdir(&(0x7f00000002c0)='./file0/file0\x00') mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) removexattr(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000400)=@random={'trusted.', 'tmpfs\x00'}) 09:23:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:23:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:24:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:24:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:11 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000480)={0x506, 0xded, 0x326d80, 0x20, 0x8001, 0x8}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f0000000780)='#\x04\xff', 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000200)='./file1\x00', &(0x7f0000000280)=[&(0x7f0000000240)='nl80211\x00'], &(0x7f0000000540)=[&(0x7f00000002c0)='nl80211\x00', &(0x7f0000000300)='nl80211\x00', &(0x7f0000000340)='#\x04\xff', &(0x7f0000000380)='[/.(\'#.[{$\'+}%]%\x00', &(0x7f00000003c0)='nl80211\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)=']\\,\x00', &(0x7f00000006c0)='^*-\x00', &(0x7f00000004c0)='(!\xaa}&\'[,\x00', &(0x7f0000000500)='nl80211\x00'], 0x400) ftruncate(0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000700)=0x4) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x9}, 0x0, 0x0, 0xfffffffc, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x7, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r2, 0xc0109428, &(0x7f0000000080)={0x1}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) execveat(r1, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000600)=[&(0x7f0000000180)='#@\x00', &(0x7f00000005c0)='&\\*([\x00'], &(0x7f0000000680)=[&(0x7f0000000640)='\\,#$\x00'], 0x100) dup2(r4, r3) dup2(r3, r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) 09:24:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x524a, 0x4}) 09:24:11 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:24:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:24:11 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000002c0)='\x00', 0x1c900000000, 0x0, 0x0, 0x84044, &(0x7f0000000400)=ANY=[@ANYBLOB="4ffc04d7c4ffdcbd21b265b059bcf8d4d20c46ba19079c5e2cf3a76d5213fafd8bdec255f9f83f55ab06519146ce5956e7f5a00a50b6ebd0bf367dff1922dc00c011163465db56b068f47ea7d6aaa1cfb6a39d378834155a4eb61b806a5c553ac2f66d68c907ff1e1725c701701aae40f9857f6b1addd90b046ac3823ece9501ca27f6797bb3b06b160219a4945a44692fa536d9c871f485055f012499843b69451094e0438a185d41e1249720e93cc3bc8cbff6f48059c2547d53e520166dafbc37e6872d8663c733b0e95083ed0f5a2c6bffb1e98fe9eeffc6cbb977f1da766a9c254d09ec142a5cf2f53e3d12732cd41f8e", @ANYRESDEC=r0, @ANYRES64=r1]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:24:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:24:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x200, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:11 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:24:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) getxattr(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)=@random={'trusted.', 'tmpfs\x00'}, &(0x7f0000000400)=""/4096, 0x1000) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:11 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:24:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:24:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:24:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x524a, 0x4}) [ 1476.863680] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:24:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:24:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) 09:24:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:24:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x524a, 0x4}) 09:24:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000400)='./file0\x00', 0xc, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/../file0\x00', 0x13) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mount$bind(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380), 0x80, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:36 executing program 5: r0 = semget$private(0x0, 0x0, 0x0) semop(r0, &(0x7f00000002c0), 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x80030, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYRES16=r1, @ANYRES64]) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) openat(r2, &(0x7f00000001c0)='./file1\x00', 0x4c4200, 0x150) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x48) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x2, 0x1000, 0x800}, {0x4, 0x6d, 0x1983413f1a6755dd}, {0x2, 0x4}, {0x1, 0xe5c2, 0x1800}, {0x0, 0x7108, 0x1000}, {0x3, 0xc1e5, 0x3800}, {0x3, 0x4779, 0x1800}, {0x2, 0x4, 0x1000}], 0x8, &(0x7f0000000380)) r3 = semget$private(0x0, 0x6, 0x0) semop(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x3800}], 0x1) semtimedop(r3, &(0x7f0000000200)=[{0x0, 0xaa94}], 0x1, &(0x7f0000000240)={0x0, 0x989680}) semop(r3, &(0x7f00000003c0)=[{0x0, 0x5, 0x1000}, {0x0, 0x60, 0x1800}, {0x0, 0xfffa, 0x800}, {0x0, 0x7, 0x800}, {0x1, 0x7}, {0x2, 0x1}], 0x6) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:24:36 executing program 6: r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000002, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_complete(r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001300)='smaps_rollup\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) openat$cgroup_subtree(r1, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x32a9, &(0x7f0000000200)={0x0, 0x6930, 0x1, 0x0, 0x37b, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x18f) syz_open_pts(0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1485.553606] EXT4-fs (sda): re-mounted. Opts: (null) 09:24:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) 09:24:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:24:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:24:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:24:36 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x100000, &(0x7f0000000700)=ANY=[@ANYRESHEX=0x0, @ANYRESOCT, @ANYRES32=r0]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) statx(r1, &(0x7f00000002c0)='./file0\x00', 0x2000, 0x10, &(0x7f0000000400)) r2 = syz_open_dev$vcsa(&(0x7f0000000580), 0xa8, 0x141200) getdents64(r2, &(0x7f00000005c0)=""/222, 0xde) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000540), 0x12, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:36 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000002c0), 0x488c, 0xe98400e73b1df751) openat(r1, &(0x7f0000000380)='./file0/file0\x00', 0x125080, 0x101) mknodat$loop(r0, &(0x7f0000000280)='./file0/file0\x00', 0x1000, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) fcntl$setown(r2, 0x8, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) r4 = syz_open_dev$mouse(&(0x7f00000004c0), 0xc00, 0x589043) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f0000000500)=0x3f, 0x4) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000480)={@mcast2, 0x43}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) pivot_root(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000440)='./file0/../file0/file0\x00') umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:36 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r0, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) read(r0, &(0x7f0000000080)=""/90, 0x5a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6c454c460000020000000000000000000000000000000000000005f70002606d0000400000000000000000000000000000000000000000003800fdff00000000000000000000f4ffffff00"/111], 0x78) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000000)) 09:24:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) 09:24:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:24:37 executing program 6: ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) 09:24:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r1 = geteuid() statx(r0, &(0x7f0000001440)='./file0/../file0\x00', 0x2000, 0x8, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x5, 0x2, &(0x7f0000001400)=[{&(0x7f0000000400)="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", 0x1000, 0x2}, {&(0x7f0000000380)="048e369653fdbeb1696f5077be405b494776f458ae0fd27d42c74c0a4b", 0x1d, 0x4}], 0x20000, &(0x7f0000001580)={[{@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x3a]}}, {@huge_never}, {@gid={'gid', 0x3d, 0xee00}}, {@size={'size', 0x3d, [0x33, 0x38]}}, {@uid={'uid', 0x3d, r1}}, {@gid={'gid', 0x3d, r2}}, {@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x6b, 0x32, 0x67, 0x6b, 0x2e, 0x36]}}, {@mpol={'mpol', 0x3d, {'default', '', @void}}}, {@huge_within_size}], [{@seclabel}, {@pcr={'pcr', 0x3d, 0x2}}, {@dont_appraise}]}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:24:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:24:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x0, 0x4}) 09:24:37 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3}}) 09:24:37 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:24:37 executing program 6: sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x100010, 0xffffffffffffffff, 0xcb5c1000) socket$nl_generic(0x10, 0x3, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0x80000001, 0x8, 0x7, 0x2f4, 0x7fffffff}) mmap(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 1500.465285] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:25:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x8, 0x6, &(0x7f0000000740)=[{&(0x7f0000000400)="7fff0d6d5d92ca9d0098983c3da33cc6c70a435552ae632efca907b379cda21c75d88c1b8e1a61e158643f8383ae3389cfe9bc462da2ea880180848a7d4697de81ea", 0x42, 0x4b}, {&(0x7f0000000480)="a68af16a85464a87568c91e11c9cecfd8e052af2b9c394cb689f3c66de0835b5e923f951bac084ee5b988f0d9533a9946467f36edfbb7d7f9c1e56e1438a0ddf48e36d826f4beb86822505f191b4e439acfad8983e95e86c8a9ad9e583", 0x5d, 0x1000}, {&(0x7f0000000500)="23df1fbfb7e4529907ccacef844dfb6f0dceafd31c1fbae6cdd7bc78b7b329d3d188a559b5b5cf8c213fe4846a269997d7d60a9e69e59039a596e04694d7a65625238b8f7d9dcfdff352b2e0fd26e57d399d3ecac1efaf41a5b3b5e14e760e4c6a167f6a02db2094da488384a1a86fa8b0d6171c2e4064773fef90daf0cde81aff733ff5c40636e540ed61dbb32d1f700bafc6f1ae6cb708e75af98ab9ef56e4d9495aa1a6e3319b55d46a491a943b35f13cb9a1c9", 0xb5, 0x200}, {&(0x7f0000000380)="683475be765c6574d4", 0x9, 0xfffffffffffffffc}, {&(0x7f00000005c0)="49f71a425857417605842152a4c33db656b0d62eacf1d3240ad7172b1e86c51f155830b54334d5a050e781f47263be7e6413701ed079df42a521dc4fe560c919b0ae4afd9778fa4558fe7dcd41a596ef99f5afb8e1", 0x55, 0x81}, {&(0x7f0000000640)="a7d1658c57acd7d84980e16a3d36d1a8d8269e56e4ab6cc6bd096e605c20519beae6643d8fb3bc5df78471e3bb10aefc3267d5037c5accd8e8afb1da7c362464aa77c706b62a63dd63f41261b3ea9efd7493b51d50794b8a399090b4e6e7d4c8b47000f662bcf3d32b2376fd3c80bbe719dae93b21d9c95151ff79e65e8fafbbfc6e56f146a7ec6b43e3c93491120e86e15b4678478f6704f7830974aa3eeb204d7e40c1914d91be46cc38b1d1d9c66f48e53e053d48e443df42f7890e9e983ca2bea0138aa7cbf15f", 0xc9, 0x7}], 0x1028400, &(0x7f0000000800)={[{@dax}], [{@obj_user={'obj_user', 0x3d, 'tmpfs\x00'}}]}) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:25:00 executing program 5: syz_extract_tcp_res(&(0x7f00000002c0), 0x2, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000400)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="f4c774ac7bff", @val={@val={0x9100, 0x7, 0x1, 0x2}, {0x8100, 0x5, 0x1}}, {@canfd={0xd, {{0x1, 0x1, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, "97bdd2c73152e6e12c47fbaa06b4936d88d03ad6dda331d82b1a56bfedc216a15fec646f4a67f2a426826dd923ac5733b56caf4e0b90d90a931716d89ca0f9e6"}}}}, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:25:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, 0x0, 0x10044001) 09:25:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:25:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3}}) 09:25:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:25:00 executing program 6: syz_open_procfs$namespace(0x0, 0x0) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000140)=0x13, 0x4) io_uring_enter(0xffffffffffffffff, 0x2fca, 0xafa7, 0x1, &(0x7f0000000000)={[0xfff]}, 0x8) 09:25:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x0, 0x4}) 09:25:00 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 09:25:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:25:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, 0x0, 0x10044001) [ 1523.528379] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:25:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x0, 0x4}) 09:25:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, 0x0, 0x10044001) 09:25:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:25:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x141) 09:25:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:25:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(r0, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x2}) close_range(r1, r1, 0x2) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@private1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) mount$9p_virtio(&(0x7f00000002c0), &(0x7f0000000380)='\x00', &(0x7f0000000400), 0x100a000, &(0x7f0000000580)={'trans=virtio,', {[{@cache_fscache}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@nodevmap}, {@loose}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@loose}], [{@appraise}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_appraise}, {@smackfsdef={'smackfsdef', 0x3d, 'tmpfs\x00'}}]}}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:25:23 executing program 6: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r2, 0x0, 0x806, 0x0) ftruncate(r1, 0x1000003) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x2) openat$cgroup_int(r3, &(0x7f0000000180)='cpuset.cpu_exclusive\x00', 0x2, 0x0) fallocate(r0, 0x60, 0x2c1, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) accept$unix(r4, 0x0, &(0x7f00000000c0)) syz_io_uring_complete(0x0) r5 = socket$inet(0x2, 0x4, 0x9) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f00000002c0)={0xfffffffd, {{0x2, 0x4e22, @private=0xa010102}}}, 0x88) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop3', 0x800, 0xc2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r6, 0x80047210, &(0x7f0000000080)) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x10000, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 09:25:23 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3}}) 09:25:23 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) (fail_nth: 1) 09:25:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) 09:25:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:25:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0/../file0\x00', 0x4000, 0x20) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380), 0x8018, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:25:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:25:23 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)={0x4c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0xd}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x4040044) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0/file0\x00', 0x1fffd, 0x0, 0x0, 0x210540d, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000100)=0x0, &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r1) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) fork() sendmmsg$unix(r3, &(0x7f0000001880)=[{{&(0x7f0000000940)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40}}, {{0x0, 0xfffffed4, 0x0, 0x0, &(0x7f0000000580)=[@cred={{0x0, 0x1, 0x2, {0x0, 0x0, r2}}}], 0x20}}], 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000540)=[{&(0x7f00000005c0)="d164834d7c175919ae34da5edc896ce9497e54a28666f5998c051a06ab29d48ec4ffb08f", 0x24}, {&(0x7f0000000600)="145c669bda7e37c4f243d3d5e1fbc21c1cc7299111e49f3b2c25c636b5d7c0c5d500cd748aea6cd1c2a9be213ca5e1ef2e7d2911c093ab9fd6c6a50d29b3cbbde3f0aa753cc4e90939b30d54faa42b9f019142d46a90c953b6", 0x59}, {&(0x7f0000000780)="36153aa602f5e3a4609d733b2f67adcbb2565c3532c639f40001e4d2f94212276860b8d2116509ce24289d0be9ff29f5f3ba584df49ddc7a1140f50b8fe47ff2f995cfc1894a179b61b0642dc456432d31e25c7dbcb22345edaf23b70fb799102a88e454a9d1d5ca88bdf447a14ec5371b8c62e5fbed983ce35226d4696e3361c1bb0013", 0x84}], 0x3, &(0x7f0000000540), 0x0, 0x20000800}, 0x20) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0/../file0\x00', 0x480, 0x41) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:25:23 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_snmp6\x00') openat(r0, &(0x7f0000000040)='./file0\x00', 0x680080, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x7, 0x224601) close(r1) readv(r1, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/40, 0x28}], 0x4) [ 1532.385990] FAULT_INJECTION: forcing a failure. [ 1532.385990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1532.387393] CPU: 1 PID: 8345 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1532.388182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1532.389307] Call Trace: [ 1532.389757] dump_stack+0x107/0x167 [ 1532.390241] should_fail.cold+0x5/0xa [ 1532.390791] _copy_from_user+0x2e/0x1b0 [ 1532.391370] set_selection_user+0x73/0x190 [ 1532.391920] ? sel_loadlut+0xf0/0xf0 [ 1532.392453] tioclinux+0x35b/0x5b0 [ 1532.392949] vt_ioctl+0x1ee5/0x2c90 [ 1532.393459] ? vt_waitactive+0x3a0/0x3a0 [ 1532.394249] ? __lock_acquire+0xbb1/0x5b00 [ 1532.394985] ? perf_trace_lock+0xac/0x490 [ 1532.395665] ? SOFTIRQ_verbose+0x10/0x10 [ 1532.396227] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1532.396968] ? vt_waitactive+0x3a0/0x3a0 [ 1532.397699] tty_ioctl+0x862/0x1840 [ 1532.398256] ? tty_fasync+0x390/0x390 [ 1532.398830] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1532.399706] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1532.400459] ? do_vfs_ioctl+0x283/0x10d0 [ 1532.400999] ? selinux_inode_getsecctx+0x90/0x90 [ 1532.401627] ? generic_block_fiemap+0x60/0x60 [ 1532.402242] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1532.402943] ? selinux_file_ioctl+0xb1/0x260 [ 1532.403760] ? tty_fasync+0x390/0x390 [ 1532.404542] __x64_sys_ioctl+0x19a/0x210 [ 1532.405278] do_syscall_64+0x33/0x40 [ 1532.405919] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1532.406586] RIP: 0033:0x7fd54e431b19 [ 1532.407074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1532.409742] RSP: 002b:00007fd54b9a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1532.410940] RAX: ffffffffffffffda RBX: 00007fd54e544f60 RCX: 00007fd54e431b19 [ 1532.412029] RDX: 0000000020000040 RSI: 000000000000541c RDI: 0000000000000003 [ 1532.413265] RBP: 00007fd54b9a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.414446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1532.415457] R13: 00007ffc27deea9f R14: 00007fd54b9a7300 R15: 0000000000022000 09:25:23 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) (fail_nth: 2) [ 1532.836613] FAULT_INJECTION: forcing a failure. [ 1532.836613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1532.838581] CPU: 0 PID: 8369 Comm: syz-executor.0 Not tainted 5.10.161 #1 [ 1532.839538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1532.840699] Call Trace: [ 1532.841073] dump_stack+0x107/0x167 [ 1532.841558] should_fail.cold+0x5/0xa [ 1532.842070] _copy_from_user+0x2e/0x1b0 [ 1532.842598] kstrtouint_from_user+0xbd/0x220 [ 1532.843205] ? kstrtou8_from_user+0x210/0x210 [ 1532.843790] ? lock_acquire+0x197/0x490 [ 1532.844327] ? ksys_write+0x12d/0x260 [ 1532.844958] proc_fail_nth_write+0x78/0x220 [ 1532.845638] ? proc_task_getattr+0x1f0/0x1f0 [ 1532.846354] ? __fget_files+0x296/0x480 [ 1532.846917] ? proc_task_getattr+0x1f0/0x1f0 [ 1532.847505] vfs_write+0x29a/0xa30 [ 1532.847975] ksys_write+0x12d/0x260 [ 1532.848518] ? __ia32_sys_read+0xb0/0xb0 [ 1532.849094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1532.849835] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1532.850561] do_syscall_64+0x33/0x40 [ 1532.851045] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1532.851717] RIP: 0033:0x7fd54e3e45ff [ 1532.852186] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1532.855193] RSP: 002b:00007fd54b986170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1532.856207] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd54e3e45ff [ 1532.857182] RDX: 0000000000000001 RSI: 00007fd54b9861e0 RDI: 0000000000000003 [ 1532.858185] RBP: 00007fd54b9861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.859142] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1532.860063] R13: 00007ffc27deea9f R14: 00007fd54b986300 R15: 0000000000022000 [ 1532.861374] hpet: Lost 1 RTC interrupts [ 1546.475059] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:25:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:25:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) 09:25:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:25:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:25:46 executing program 6: r0 = memfd_create(&(0x7f0000000040)='\xf0\xd7\x1e\xcf\x984\xea\xbfJ\x8a\xcfX\xa3\x93\xccQ9\xde6A\xbb(\xbf\xeb\x92\xa9\xb3\x87$\xc1]\xb6\x801', 0x6) fcntl$addseals(r0, 0x409, 0x6) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xbb}) 09:25:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) getdents(r1, &(0x7f0000000500)=""/142, 0x8e) getdents(r0, 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x400000, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRESHEX=r0, @ANYRES16=r0, @ANYRESOCT=r0, @ANYRES32=r2]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000800)='./file1\x00', &(0x7f0000000840), 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0/../file0\x00', 0x100, 0x5, &(0x7f0000001b00)=[{&(0x7f0000000880)="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", 0x1000, 0x24d}, {&(0x7f0000001880)="7af6ec7a505eff70b17151701c215a951aae1e8015e71b69a3a9cbfa01d399a9064616a3c01159c838f2541aff952dcdd5efc3e0f7e641e9e4065171e7c39065ccddd281be9d4f1c89b5430b1008c234fd1c489085c28e2745a2a340855f1256a932d647b7547163035a53e18f846cd423da0cca0dfe3149193f3d3bfb28c415ad10e3c4a86c1f6d0446d022d272fa3b7a", 0x91, 0x5}, {&(0x7f0000001940)="7b8515e02a5c", 0x6, 0xab}, {&(0x7f0000001980)="1d8fe171db525ac28aa7b6753530bdab5eef0caf5c0be77021d68355ae41d95e01758215c8f6e1ced611841b3431e93f9909bdd3e42a5d68df81548e9ae0ebadea4aaf52c32755183e79ef19d5a4b4e7079d581f8186224f24bbaa6b609fe47bf82716003af813a6456308c721ea3d9a38e99cc34e79837311e76b438c9a68ca70248baf46e40c667a4ea77209e3d6959926dbecbfe6ec7a87", 0x99, 0x9}, {&(0x7f0000001a40)="875860880d790196eea11926558c8b0b6db215438bcff3325dd6a152457b9ba1e164af8bca36e16fc07070edf4e04db56ce64d5e6c04680934d350d8fddc036ed42ebd75cf123941f202e21d5b29d6024b11607f35837764b94a8451cccb2ddbf798bea761e7167c3b055e940ab057dd0f1bf239efab3bc8c00b0d1dcea024ae1cd9a4a29534b2", 0x87, 0x8000000000000000}], 0x0, &(0x7f0000001b80)={[{@uid={'uid', 0x3d, 0xee01}}, {@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x30]}}], [{@pcr={'pcr', 0x3d, 0x3a}}]}) umount2(&(0x7f0000000200)='./file0/file0\x00', 0x1a) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x800, 0x3, &(0x7f0000000700)=[{&(0x7f00000005c0)="ea524be7e8fd01ff13e670771463fcf3206afbd391c4b075cfaffbec9bbac62dd0e6bb0569fbf5b1a2cc04b507eb25c8fc1519af8d1661c51c57f8965e3ae737c6e16cd195653099088eff63a7cd8545adc88eee9dc610248a9ad16fed97cc579d58a4e70293b7f1762e4e437a9ba72e84afaf6f6f365ba15b9342e2cdbd0d5b02a0e9", 0x83, 0x3f}, {&(0x7f0000000400)="adc072fb6084aac4f8c63c", 0xb, 0x4080000000000}, {&(0x7f0000000680)="93e56397094822c72204f00329ba5b4519dc575d3efd606ad5acf4d7d27b3acae2741e006da358a818cab069a625d8780bb007b113975757bc762ad2734bb1063fb302a89b43f7db438a6384e2e5fa5171676cd0856f6decf805c728c801a98c6e69ad78669ca8469f5f4182b11cdf9aa2969051a395dc2d27a2ef", 0x7b, 0x5e}], 0x12, &(0x7f0000000780)={[{@grpjquota}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, 'tmpfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) 09:25:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x173000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=ANY=[]) chroot(&(0x7f0000000280)='./file0/../file0\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x1f810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:25:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:25:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x2, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1555.365456] tmpfs: Unknown parameter 'pcr' 09:25:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1555.415205] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:25:46 executing program 6: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ppoll(&(0x7f0000000040)=[{r0, 0x1000}, {0xffffffffffffffff, 0x2}, {0xffffffffffffffff, 0x4000}], 0x3, &(0x7f0000000080), &(0x7f00000000c0)={[0x80]}, 0x8) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000100)={0x2, 0xe68f, @start={0x0, 0x0, "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", "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"}, [0x8, 0x2, 0x8, 0x0, 0xffffffffffff1581, 0x200000000000, 0x8, 0x10000, 0x2, 0x8, 0x9, 0x9, 0xc259, 0x7, 0x4, 0x3, 0x5f16, 0x8, 0x3, 0xffffffff80000001, 0x2713, 0x4, 0x2, 0xce6, 0x2, 0x20, 0x4, 0x2, 0x1ff, 0x3, 0x10001, 0x1, 0x100000001, 0x8001, 0x8, 0x55, 0xfffffffffffffffd, 0xecc2, 0x800, 0x1000, 0x10, 0x2, 0x1, 0x9, 0x1, 0xfff, 0x7243cd0d, 0x4, 0x9, 0x9, 0xfffffffffffffc18, 0xffffffffffffffde, 0x7f, 0x7, 0xfcf9, 0x100, 0x80000000, 0x9, 0x0, 0x4ee, 0xffff, 0x1, 0x3]}) write(0xffffffffffffffff, &(0x7f0000000b40)="f1537ca4559ec9366a2ccf9ecc4c21c6cfbb8fdebd90da5e07311ebf7203ec268fbbf68ce2c669f1e2ceb7228873d2cc74e88b40d99cc39e8d6beea74f0e94f7b24272d62d7a9ad00aee9a71e85fcd526116f433fbef02c3b64fcfff6019075843aa980fe52282be4b5eae7828caf157782b08e36f13cb61a1c06f49536463ad2420a1769fc4b4350a1639797d9e8be1c1c1c12098dd6ff1df789b170685f0f751be80", 0xa3) pipe(&(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}) openat2(r1, &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0xc000, 0x108, 0x17}, 0x18) r3 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000d00)={0x0, 0x80, 0x3, 0x9, 0x3, 0x7, 0x0, 0x7fff, 0x488a, 0xd, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000cc0), 0xa}, 0x10048, 0xd1ad, 0x4, 0x3, 0x1, 0xffffff29, 0xfff, 0x0, 0xffffffff, 0x0, 0x7ff}, r3, 0xb, r2, 0x2) connect$bt_l2cap(r0, &(0x7f0000000d80)={0x1f, 0x1f, @any, 0x6, 0x2}, 0xe) r4 = openat2(r0, &(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x30b104}, 0x18) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000ec0)={0x0}, &(0x7f0000000f00)=0xc) perf_event_open(&(0x7f0000000e40)={0x3, 0x80, 0xff, 0x0, 0x1, 0x0, 0x0, 0x9, 0x200, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1f, 0xe25e41bff4af014d, @perf_config_ext={0x8, 0xdec6}, 0x10004, 0x0, 0x16c, 0x7, 0x4, 0x6, 0x2, 0x0, 0xffffff7f, 0x0, 0x794a}, r5, 0x7, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000f40)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file1\x00'}) sendmsg$NL80211_CMD_DISASSOCIATE(r6, &(0x7f0000001040)={&(0x7f0000000f80)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001000)={&(0x7f0000000fc0)={0x38, 0x0, 0x2, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="7e9c1c11ea2e"}]}, 0x38}, 0x1, 0x0, 0x0, 0x88094}, 0x4000000) recvfrom$packet(r1, &(0x7f0000001080)=""/120, 0x78, 0x40000000, &(0x7f0000001100)={0x11, 0x7, 0x0, 0x1, 0x2, 0x6, @random="110d2faa4b6f"}, 0x14) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000001140)) fremovexattr(r0, &(0x7f0000001180)=@known='user.incfs.id\x00') perf_event_open(&(0x7f00000011c0)={0x5, 0x80, 0xa0, 0x31, 0xd2, 0x7f, 0x0, 0xfffffffffffff7ba, 0xa0002, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0x1ff, 0x1ff}, 0x18811, 0x8, 0xffff9cb2, 0x9, 0x472d, 0xe86, 0x3, 0x0, 0x8, 0x0, 0x8}, r3, 0x4, r6, 0x8) r7 = syz_mount_image$nfs(&(0x7f0000001240), &(0x7f0000001280)='./file1\x00', 0xeda6, 0x8, &(0x7f0000001680)=[{&(0x7f00000012c0)="737a5de244cd0cd9a5821b", 0xb, 0x5}, {&(0x7f0000001300)="71fd0765c77f898eb860205c5bbbd5f859b09f8ba4fb5478e05a17d3dbedd8c5339a2c8df7137eb9f27856d4921d7fd8d1c1054b886367f5cfdf3bec3b90e4b9bd15331751ac0c0f14a8bca65fcc312d1cd08d59ef8b0842f1cd62b3417506e155f650ab82934733460495033d30ae134ce46c344e5472f64ce9700ed208afe021074cc13749b159c608e55584f74160787e83f2a772aa5772ce6b04a8007b92113ec1722eea741b951f6a6b5477ba8822d71f79925d69c1406f6c30256b00da2c943d5d4bb07706a078e1d43763b242", 0xd0, 0x8}, {&(0x7f0000001400)="70ce402f1571d653c03214bf45efda5f8d4e2474096605e3a5b0a1071ea1c01d637679f5e077", 0x26, 0xe72e}, {&(0x7f0000001440)="1923d4ef694108c30533d0e7d01246", 0xf, 0x401}, {&(0x7f0000001480)="5e9b12f63c", 0x5}, {&(0x7f00000014c0)="e10f59f2ffd6443f010198f836445e31a999c77d807419b2f9c60ebf713395b919cc1afad17ffaea72510277a85b51a02a7d4d5a639b4786d0b84bf33abd85414b6aedf83de253cb39e1d1833299052e5db4aa93392772cbae5ad8a015bb891ce85603e0e35a67b59e510cca95d2c1a9ec670f67f94a28bd75110137391c04df396019f346a1af", 0x87, 0x5}, {&(0x7f0000001580)="c5f0b5ecfa36e23ee6bd812c8e4cbdc5cebef3928f05e3c703420b2e150a4d0411d36f6463e9c53a60ffe1115b1234f606e9c010b77e56bddcea0936378e16ebfb2acfdc1a8b1bdec5d998", 0x4b}, {&(0x7f0000001600)="bc1ee85aa041727ea45bd22d86b9174b9cc5b2b5cb708de53489114ed8be5a594a750b3b444b5bfac094edd6d2b5cd35e6e807d10656f1c3cf92b0e0a4e7b7e43c1d14255fc44126", 0x48, 0x3}], 0x4000, &(0x7f0000001740)={[{'%@:'}, {'user.incfs.id\x00'}, {'&*[/!'}, {'!^'}, {'\x00'}, {'user.incfs.id\x00'}], [{@smackfsdef={'smackfsdef', 0x3d, '/'}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}]}) dup2(r7, r2) 09:25:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) 09:25:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x10000, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:25:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:25:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0xc40000, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0xc) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000400)=""/246, 0xf6) umount2(&(0x7f0000000280)='./file0/../file0\x00', 0x0) 09:25:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b2f, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1555.682559] nfs: Unknown parameter '%@:' [ 1555.701923] nfs: Unknown parameter '%@:' 09:26:01 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:26:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x1021820, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:26:01 executing program 3: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:26:01 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$9p_unix(&(0x7f00000002c0)='./file0/file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x200000, &(0x7f0000000440)={'trans=unix,', {[{@posixacl}, {@version_9p2000}, {@noextend}, {@mmap}, {@version_u}, {@cachetag={'cachetag', 0x3d, 'tmpfs\x00'}}, {@cache_none}, {@access_uid={'access', 0x3d, 0xee01}}, {@noextend}], [{@permit_directio}]}}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) r1 = openat(r0, &(0x7f0000000a80)='./file0/../file0\x00', 0x4000, 0x141) openat(r1, &(0x7f0000000ac0)='./file0/../file0\x00', 0x0, 0x60) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) r3 = syz_mount_image$nfs(&(0x7f0000000540), &(0x7f0000000580)='./file0/../file0\x00', 0x8, 0x5, &(0x7f00000008c0)=[{&(0x7f00000005c0)="d51b0678fce6b2b45a063dc41ce9bc99af79a537021b9c64fa909b4f88ce19b7159cf076682dcddf9eb3c8fd54e08fd772401043a479dfda9a6c71cf4b152f6ac9cf9ff51a6d393ac6daae", 0x4b, 0xc93}, {&(0x7f0000000640)="da08cbd830abd884e822788ef26c32", 0xf, 0x9}, {&(0x7f0000000680)="00bc25b79b4cc89b39bddc2fdc5c3318df1ec70069823ea1cb9df04161a09c1afd749ce1eaa21a957d81bd1d9c783d60161fe76a51e65b6842aa98b9b6424a348cf2d22e12c0cf6f72c269afb7d8e0ef59ee3d38872ab30b7a0b481c4f8a8e6bc0ca80b4c0cc34eb733a3cd633017e0514f530a1296534437a2cc151ca4d33ad7c39f29da64965d6d71568c5dbf4e7079095e29e8f2cf59fc513208b04daae61f27b260788e56f86c4d53ec375d08cf882656bda6ee323aa3d93ec749e0c9745d1e6d1c331ef8ffbccab01d109470c8a71a7d07ccf9af8a826d1e7c721d46e", 0xdf, 0xfff}, {&(0x7f0000000780)="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", 0xff}, {&(0x7f0000000880)="3909bafddae6e74d0365fc31aa56264a12dcbf880009e3b6aaee406530a9f50199abdfac5c213343712dd0f76343e1f19fececbc861e78a8b65c836303", 0x3d, 0x4}], 0x810422, &(0x7f0000000940)={[{'\\B*..\x17,'}, {'cache=none'}, {'cache=none'}, {'trans=unix,'}, {'@u'}, {}, {}, {'version=9p2000'}, {'-'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '.]'}}, {@permit_directio}, {@uid_gt={'uid>', 0xee01}}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x80000000}}, {@smackfsdef={'smackfsdef', 0x3d, '(@t('}}, {@euid_lt={'euid<', 0xee01}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@fowner_gt}]}) move_mount(r2, &(0x7f0000000500)='./file0/file0/file0/file0\x00', r3, &(0x7f0000000a40)='./file0/file0\x00', 0x20) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:26:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) 09:26:01 executing program 6: r0 = creat(&(0x7f0000000000)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setsig(r0, 0xa, 0x21) creat(&(0x7f0000000080)='./file2\x00', 0x70) close(r0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xf7, 0x8, 0xc1, 0x7, 0x0, 0x4, 0x100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0x8000, 0x100000001, 0x33, 0x3, 0x0, 0x6, 0x9, 0x0, 0xfffffeff, 0x0, 0x7}, r1, 0xe, r0, 0x9) getdents(r3, 0x0, 0x0) kcmp(0x0, r1, 0x2, r2, r3) 09:26:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b30, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:26:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 1) [ 1570.868282] 9pnet: p9_fd_create_unix (8433): problem connecting socket: ./file0/file0/file0: -2 09:26:02 executing program 3: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:26:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) 09:26:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b31, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:26:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000005c0)='appraise_type=imasig', &(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000d80)=0xe8) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x7fffffff, 0x3, &(0x7f0000000500)=[{&(0x7f0000000400)="12448e914f17828f40441a599435a63bc76670773f9b02139490825d58b1e0624596e0521be705d9206d7bfca607f8eb672cf4e77897e66ddcb3adce5bb673abd5803a89ea4d3b8de66348c35c814b34c099", 0x52, 0x20}, {&(0x7f0000000380)="f3159f829523032fbf2209b2cdbf6709f5a87aa57580d8e531e600141cfc381aad3bcc4e1260fa03acd632b69ed1146c80855a070f69dc87", 0x38}, {&(0x7f0000000480)="5866d5e533501e1aa92cca73e5143eb81d730f261a36109fc3701bc595afd75e8cd3ed0e493abb6f8c843a180acb95bda3319a5cf121636ee3ea6a7b0643405fe2f2a5e7458bbd6b322469cd813ca58160bd00b9bdba725a1c31e8e73d25e9cd10edcf298466e997323f70196a7fa5500bd645ec9dced9c7995f0ba4f899ad", 0x7f, 0x5}], 0x101000, &(0x7f0000000dc0)={[{@usrquota}, {@nobarrier}, {@dioread_nolock}, {@mblk_io_submit}], [{@appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x62, 0xe, 0x39, 0x39, 0x32, 0x66, 0x39], 0x2d, [0x35, 0x66, 0x65, 0x61], 0x2d, [0x39, 0x32, 0x34, 0x51], 0x2d, [0x34, 0x64, 0x36, 0x39], 0x2d, [0x52, 0x66, 0x0, 0x39, 0x61, 0x2a, 0x7b]}}}, {@euid_lt={'euid<', r1}}, {@fsmagic={'fsmagic', 0x3d, 0x3f}}, {@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0xc, 0x36, 0x33, 0x37, 0x62, 0x64, 0x62, 0x65], 0x2d, [0x61, 0x66, 0x38, 0x61], 0x2d, [0x32, 0x38, 0x37, 0x62], 0x2d, [0x30, 0x61, 0x32, 0x61], 0x2d, [0x62, 0x38, 0x35, 0x65, 0x63, 0x64, 0x31, 0x39]}}}]}) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000680)='./file0/file0\x00', 0x904, 0x2, &(0x7f0000000800)=[{&(0x7f00000006c0), 0x0, 0x1}, {&(0x7f0000000700)="190aaf758f7ae904a78b5a44c94a2442687ceedc2bbd32b5baf62a499edac184d3f4b63276acb262c6447d5edce001a898297149b1f056d0638d65dab5c1072c59468da55b22e73ebaa51e0cf98764e07c323526937cab7964799e4a7dbfc66153ab9dabc05c27dd8d18cd954d489c5a29685acf3a1d46b4944aecd716553705012be81f800132e7a83489c22617841641e9538988b1cf03cc6239d3d82fa56f5f3761543f08618796de0f6503885af528ac09cc86b7f3faa58dd6f46ae7bc099f83459d3d88c0381c303d", 0xcb, 0x7}], 0x2080804, &(0x7f0000000840)={[{@jqfmt_vfsv0}, {@data_err_ignore}, {@nouid32}, {@journal_async_commit}, {@data_ordered}, {@noquota}, {@sysvgroups}], [{@dont_appraise}]}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000640)='./file0/../file0\x00', 0x0, 0x36850, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1570.936421] EXT4-fs (sda): Unrecognized mount option "\B*.." or missing value [ 1570.966877] FAULT_INJECTION: forcing a failure. [ 1570.966877] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1570.968811] CPU: 1 PID: 8442 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1570.969759] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1570.971052] Call Trace: [ 1570.971417] dump_stack+0x107/0x167 [ 1570.971931] should_fail.cold+0x5/0xa [ 1570.972456] _copy_from_user+0x2e/0x1b0 [ 1570.973163] __ext4_ioctl+0x26f0/0x41c0 [ 1570.973794] ? __lock_acquire+0xbb1/0x5b00 [ 1570.974369] ? ext4_reset_inode_seed+0x450/0x450 [ 1570.974986] ? perf_trace_lock+0xac/0x490 [ 1570.975606] ? SOFTIRQ_verbose+0x10/0x10 [ 1570.976274] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1570.977100] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1570.977900] ? do_vfs_ioctl+0x283/0x10d0 [ 1570.978440] ? selinux_inode_getsecctx+0x90/0x90 [ 1570.979105] ? generic_block_fiemap+0x60/0x60 [ 1570.979706] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1570.980481] ? ext4_fc_start_update+0xa2/0x2e0 [ 1570.981158] ext4_ioctl+0x46/0x90 [ 1570.981753] ? __ext4_ioctl+0x41c0/0x41c0 [ 1570.982435] __x64_sys_ioctl+0x19a/0x210 [ 1570.982978] do_syscall_64+0x33/0x40 [ 1570.983548] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1570.984396] RIP: 0033:0x7fe0be643b19 [ 1570.984925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1570.987683] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1570.988747] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1570.989798] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1570.990863] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1570.991896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1570.992939] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1571.004611] 9pnet: p9_fd_create_unix (8433): problem connecting socket: ./file0/file0/file0: -2 09:26:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:26:02 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003b40)=ANY=[@ANYBLOB="24000000000000002900000032000000fe1109f6bd8000"/32, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x28}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x400, 0x2, @loopback, 0x6}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1571.045288] EXT4-fs (sda): Unrecognized mount option "\B*.." or missing value 09:26:02 executing program 3: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:26:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xeff}}, './file0/file0\x00'}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:26:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) chroot(&(0x7f00000002c0)='./file1\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:26:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b32, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1585.478209] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:26:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:26:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) 09:26:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) unshare(0x28020600) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) acct(&(0x7f0000000040)='./file0\x00') fcntl$getflags(0xffffffffffffffff, 0x1) unshare(0x48020200) 09:26:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1004, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) fchmodat(r0, &(0x7f0000000280)='./file0/file0\x00', 0x10) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f00000006c0)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000380), &(0x7f0000000480)='./file0\x00', 0x1, 0x1, &(0x7f0000000580)=[{&(0x7f00000004c0)="d99a0ed983e3d6c332b68bdeb24580bc3ea4b54dcb7b0f122b9be2b1f4abfdf5f0cb8af3fc9c106cb97f60c13e1af5125b6c032d641dc553a67aa026f40c6a1d7e725541bb779114b108d23d4abaf476985436b76414e0c60f90c6526caba511204f497fd06235f09ee653a331f5bc437978935e5deb2129d5ba3413244b73f28afe39673637fec6283e9ed4295d6325916937e178b1efc615f724304e40ce88f8b10023", 0xa4, 0x3fffffff8000000}], 0x40, &(0x7f0000000700)={[{@huge_within_size}, {@huge_advise}, {@nr_blocks={'nr_blocks', 0x3d, [0x36, 0x34, 0x36, 0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x67, 0x39, 0x7, 0x6b]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x31, 0x39]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x60, 0x74, 0x25, 0x36]}}], [{@measure}, {@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}, {@uid_gt={'uid>', r1}}]}) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000400)) 09:26:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$9p_xen(&(0x7f00000002c0), &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000400), 0x50080, &(0x7f0000000540)={'trans=xen,', {[{@msize={'msize', 0x3d, 0x1}}], [{@fowner_lt={'fowner<', r0}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_measure}, {@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', 0xee01}}, {@fsname={'fsname', 0x3d, 'tmpfs\x00'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@appraise}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(r2, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r2, 0x2}) close_range(r3, r3, 0x2) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000440)='./file0/../file0/file0\x00', &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {0x1, 0x3}, [], {}, [{0x8, 0x2, r1}, {0x8, 0x6, 0xffffffffffffffff}, {0x8, 0x2}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x2}, {0x8, 0x6, 0xee01}, {0x8, 0x2}, {0x8, 0x2, r4}, {0x8, 0x2, r5}], {}, {0x20, 0x1}}, 0x74, 0x2) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:26:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 2) 09:26:25 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:26:25 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b33, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:26:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) [ 1594.232454] tmpfs: Unsupported parameter 'huge' 09:26:25 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1594.283181] tmpfs: Unsupported parameter 'huge' [ 1594.291124] FAULT_INJECTION: forcing a failure. [ 1594.291124] name failslab, interval 1, probability 0, space 0, times 0 [ 1594.293031] CPU: 0 PID: 8499 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1594.294022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1594.295171] Call Trace: [ 1594.295562] dump_stack+0x107/0x167 [ 1594.296054] should_fail.cold+0x5/0xa [ 1594.296561] ? ext4_find_extent+0xa3d/0xd30 [ 1594.297248] should_failslab+0x5/0x20 [ 1594.297799] __kmalloc+0x72/0x3f0 [ 1594.298272] ext4_find_extent+0xa3d/0xd30 [ 1594.298839] ext4_move_extents+0xaeb/0x3270 [ 1594.299439] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1594.300142] ? SOFTIRQ_verbose+0x10/0x10 [ 1594.300713] ? find_held_lock+0x2c/0x110 [ 1594.301344] ? lock_acquire+0x197/0x490 [ 1594.301906] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1594.302603] ? lock_release+0x6b0/0x6b0 [ 1594.303136] ? __fget_files+0x296/0x480 [ 1594.303671] ? rcu_read_lock_any_held+0x75/0xa0 [ 1594.304314] __ext4_ioctl+0x304d/0x41c0 [ 1594.304827] ? __lock_acquire+0xbb1/0x5b00 [ 1594.305398] ? ext4_reset_inode_seed+0x450/0x450 [ 1594.306038] ? perf_trace_lock+0xac/0x490 [ 1594.306608] ? SOFTIRQ_verbose+0x10/0x10 [ 1594.307204] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1594.307989] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1594.308712] ? do_vfs_ioctl+0x283/0x10d0 [ 1594.309326] ? selinux_inode_getsecctx+0x90/0x90 [ 1594.309984] ? generic_block_fiemap+0x60/0x60 [ 1594.310623] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1594.311337] ? ext4_fc_start_update+0xa2/0x2e0 [ 1594.311997] ext4_ioctl+0x46/0x90 [ 1594.312496] ? __ext4_ioctl+0x41c0/0x41c0 [ 1594.313093] __x64_sys_ioctl+0x19a/0x210 [ 1594.313683] do_syscall_64+0x33/0x40 [ 1594.314218] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1594.314933] RIP: 0033:0x7fe0be643b19 [ 1594.315484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1594.318071] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1594.319400] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1594.320378] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1594.321376] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1594.322377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1594.323385] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1594.324606] hpet: Lost 1 RTC interrupts [ 1594.346426] Process accounting resumed [ 1594.498995] Process accounting resumed 09:26:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 3) 09:26:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b34, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:26:40 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:26:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x104) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x6, 0x7, &(0x7f00000017c0)=[{&(0x7f0000000400)="febff1ece33df7a4c0a28a0c0efd06ffb4359554201e0b75d33125fe8b97547163004d1cdd253f84feef9e0b0d35612a059581", 0x33, 0x9}, {&(0x7f0000000440)="0615b849ada8545c1f33f241cecc10a858f5710c51faa65dea803cc0cd8a876148d1bc4a4008deadc6ac5218536ecf24d36dcfe3c904eba49a70ac0ec1f7a004aff1fa240442830d34b67fed50fb062d04fe8f3d19db0aeb8eb8edfafddbd78e031facfea41d772502fcbf9b7bef0597d5ebbd4a0ec5aec8f72d", 0x7a, 0xa95}, {&(0x7f00000004c0)="b4477f194dbce0bbb5e044e691317282f8351735d5be15f0c9e7ee921f2fdb80aa1f5923ef2eed59a09bf4a2da6a0371439e185400c9f46f6958581295063a2ac486d07c2ab5998f0bc3e7abe4ac341ca336c9a2a572835294e01bb635fd3047350b5333b421721c195f8094549a0f7416f66e77944f90ae6fc7fa81300dc472d514d1a50bf94000e6fc2db0ed4c412375ab1918e6d2e9671cd6209e125320a0508492ace73acd9adbb0bf72c589de4aeda837a16dacdb0aabe158c15d61d54ad687", 0xc2, 0x4}, {&(0x7f00000005c0)="825665cfe5d98b03d80272ca8c2e8efcdbfff62fe968eb383e657455b9c6301faca9869ea93cdfc97e533472840dcd1e26b15b6b5c5e5875e22eb76279c596e3b7f11155937a64afbaf57cbf2a86f1164127ee0c5be12b0c8e40c66ee7c7dec06bd7b1ca9c4409507eddbd58261d36a3b6d501dc30df5185aabf892c9543b3357a364efe58b08029b892045f872de4572e9b3561ed6db92e7fff5263f1ad8f75761e8b760110e456dbac6d529da7b9c07308af050848b6bd95ca60f962688009828b42d0b0e833bde908990d3c3e82c25a883a7320d17422349c05fb23c98e28bf602dac10591f548519e7cd05", 0xed, 0x5}, {&(0x7f00000006c0)="5dde4faeeef6547f92eb60089b7f63cf93c2ff4f6b094ffec387312c67886c1e189281df5ff735650c5afb9ea533f4683c3a62929529e5b0168750b880f47a43e9e944be7644ff878bd77c9d43fa1e2b4f2563441a7c9e63713abd37e766e20c7a97bde7bcefabfcad7b82f84446257e4974bc36f81cf8b468e4a3b64f6ef75ec84062807680d97df4a20c3b3a8bc1be273ea5004da2ec48e3319569992ef81fed1a65c8a8d2e0c14043e3c49c142d67d47065ef45b5d51079e2777664093eba5182ba03afff9c9b40f64855b516e31909798c55d5e9cb29edd1d2d8629520480adaadba8d65334fa7cc4a45aa056ce7a73d75abebd641787f765d6f4375962add578f2ba7b9ce0940225fa2efa12a590dd2f5451d668aa40f415b28031caf7193059814211114483fc36e2e5a1875b8603b082df877de084f7377d1bf43454788dc8ae62442111f7eb1620178f3ba042133d7ecf518b1ac6395835df50557800199fceb7d6521f35cbb273f8e4d36c8e5059b95ea2fba372a3b775df73a750ee634acfb9b6c72b27a99044f5fd60da09aa80ae0d3aaf35d8bc1c133ec95f71e1d7fb4872f0404650e79144d5baa838c9a52ca20bd25910a48315924eb8a208948007cf42f0b23bcd857a2e24d16d3dbfe5bd338e16d57c2b9769aff2bb7f213f95aff37145e15606da1074c0fb09378f98a03664c92c5bb7d8b2478e1e0675a54616bf5ab3d3a33250eecd48dceeb983bc1ad6bd7140b6bb1fae2d3ab9fa733a2c38f8a107d60ec0c904adeb345ec5f59c6c3811cba1f5187c186c8b7958c968ad55d3ccafe7302d1dd9c3632ecf055a1a73010ff0c101766c1206fd637f018e271e2c6e34a974498c39e1edc59d4eb4201e968f4cc63e47b8ee88fc8fb6c4e5a67e5fb8d2095c69226da1d91eba2b14948c64225801d8839cb518544d919f689de668025d3327e35075f042e0bc0474381c3cf04cd6875a0cbb1fcb43eb7fe23573a860f68213f85ca2a9d6a10086afe0536741028bf8ca17b0df25144749c1c60db49b9baea4b65c6b1d48aec7519529e5b4cd901a7f892020ba07a08d081935e52ac382c5405fe604fc08c0e473bcaba51b1aa804eb3159d8450ddcc893d1af5c55d6a74b04b62fa4f98ea8eb8b0ac2f196473dca74ebede69ad73d48ef73a078151e6500ac61ed10731ce247c34d4008149130c76f2792f4de0abc817cdac31d2d8c9cd155039c66410110090fdead7b7ff2c6deea785f4eca13a8ccb67f0da150a790915a3a8e9bd42a83eb4cc8a6295de736c28e53a09f79a60d7332b8dd32feb8536a09b3a9cccc978ffdd3b2a61cb5c99d6809514b8655509858bc2e0406c413425c1c530c80b4049ea069d03bfed24b6caa04c7afd2821d7e01fef9eab00d1e183da3a25a6cb6cc85ee40f442641aff4ac18750d26fa9e6a820a939907268a51de66b572a750664bfe946ad35d7e0fd2ca369c3757853b4aad98903c47ae80bcce3d260bb87fd267b1a78898ed2ea7cac2366ac1fcf97a4fdca2b20bac662ec3893c14efc52b785e064d87813e6dcde3ab0b87524249e811357ed19540f52c874d3f9c016503dbaf9761528f5a9caaedd539c64a1c9a10afb83333c17962c77d8d5afb37d0d2a0e727ec242eb35c32c5995a9c652fb174d735d43fa1e79f5fdce66ef9c3d63f2a87502cd4d2bee42ef7954d065d5a0ca3006917c0ac0c27afa6301b1859b2d642afdd71cec3caa8610e98093c541857d33cb5386104e9ba7a454c913272551aba0d7a92683865ed2652fe0c1405772b1046e1546eedaaa76683262b4e7d6d2a28a92bc94e145dd62a58ba53078124a304a402fcb8c20de48e78f409bc6761f4f04c5317969572bcbfa87c5bdea219aad016db4dc3e97437e762b50e9b3173d18367c5f6f45067f9402f6a82cf17fa66a6812e87e1e5d4eba5f938b109e8a102d6f75871498be6f19fadd501553985b5e1a738d47b4854b8071e9d209cc099b5849f6869e062daddd5a324db18d9a17d4574751e262baf044282d05f786e6c6080985469a93f2231b36b53d9e72910b6ebf39e1dd906a596aefc0de587ccc16a1da491660297630c541c95d8a00c455411ce7a4561a8d8d5226a233bb225115b0011f081c2c399c72ee66d31cc3c6aef7b9141a6203c6751735cf29946b1d141a40f231d7ecfb907403d03bb3f06e2c233ae35edaa8f819e0a501a8084cf8c64eceeaa9f0077af329b59194084b99082ccd06b43b64196449d4283b680856d86722efbeb91ea2a232b947a2b1cc12b123b06715890fb77f14b1e9620f4766761b1a415995b3e63e3bd7030d5e8606ddd4d848fe9ae903a67ae6eeafc0c0db9581c934ec06d6976fc83c95508e298ba140461411a748dc908a05fe038cade0519db4bc2fca065997ce8ee8e57b2bab75572b61625ffe9344fb801abefda4d2deb668254f1ac34a250848336d42fa466d219d6d7c4287bfa2b89e177900f70dee53b39ba9f7315040b9bbbc4c0a1e1d7853335e62f23aa63f9a3145567f4a37b9576cbbd1578de21964908aaf9f6a0be74420e27e4ca8bf768ae71581b14f2dd2571111f03b07438e2aca25956d49d2760a0a1260ba4e9322977e7ea4bb3d9d44a904763d47b1c2fbc969b4e98bcf8b17dcc54836ad93c9191a751bfc8a889ec54bc66cfc06cedd2a14a05729da1191a6b05b4a1ce5b6823f25cb179ed3c49555d29a19b257e204dfa102ac9c99e25b78a6ff8e012aae1a05e5e38d8f039566a3e7bc958366bdb8609380be1b050c544ab9b0ad3a3e274503e7621a0983f54bd8e4dcb2760b1e6dad4fc8e02002960020e939e57d03901eda96f22a4d295c959eb71823fb8270259cfcfaebc906ab0ee245ab058e1cb2219478e6b1b3d2e0e41571e879f8f6f45dc1664f7ee3d90045a678815e9971b1e75d09257ee32c5b80bdc18d374297b2d974b854349f9275a46eff3ec5681ac894a5a4cd0de0b7ce6f928719123e9cf3db06110e518b6881ec84fdbd1ed8310e26da2198934954a8d39568df07102399244d1ceaa0dfecf8b4c1f02f154794fed8cddf16486f66c2e7e0659b053a2460a9bbe4b75f2fda6cdcc222e94e452671565ea3d93e14a4e0cab2ab86ae371fcd505cbf2d963f5b26568a544ec21e832e2cdd127ce2bd626b726f650b0a32ee146570daea7f688f8ad310a12ddb4d5f1ec4d8842e78b0e0de2b81fa1e15fc439b0fd7073c42a876b4fdd5e4cb39cb446f00bfa2fafe7876e6fcac96f1cadf846649f02361cc3cdf7e663b40d34ad9e79a39595170fe6c88abdf0c0e9dd0696ccbe6ffa54c92b1ed72c8a25b2f0989da47559202cfdd45969063f8128ae8bca96b194e51611907fed546c2d5d57c1469433375476664c0c5a04b33f1b99e766623178b7abc4822b3508027b64b4d43b8d30fbf24327c521f0adb0bd3122f504ee87d038804bbb5b94948e1fa880bcf78c793412a535c1a5d77b175c699169606e96d2fb858c2c9d42ff8a777e3cd4bdae8d66ad1db1a20c7e9eb9240c13ad8ed6048417d7996bccef41222caaf27ffe970538b4bf289432d14e0b5aabae0233f63ee65eb30cb02a33c56c271882f409a6da0e5ba94cb563ddd58d5927a4e9078fccf94305105f374cb31b65d343bf8f6c97a31623d6b40321b475b17f35955e85537891231a1010298dcc835e41ad4098b968de1cf89cc0e73117fca7f2a9bfa0fe4528cfe98d3e0a572a9a32808f57edb0f82251324ebf8d2eac8ab5fde7308c704a9b4b64a3dd11b46b3c5404310385d8010b0e99f748e341e41b4fd9de5069247c81368c20ed7c379ca4aa87a3a18d38e21c085e5738418dbcffb0cc6a8c353dda44f7beec49c49fcaf22d57157942dc39eb84ba21772b7c551768f03e0e4ff25f35572ab07197cabebc15608dfc7c62e1767c5d90d8fb6d487cdcfd94c50832c38329b1253bff9d713aef90006a485b2823f29456ff36dfef2592fcf4f0deaca600350c4168c9457bd146498d1bea5c9e211131e786ee73a96c167671a1d6c4a452be195eadb053bf878e330b864bd3dcbb78af281df3e1ac6e65be06e7f0962adba246800710c58f64af44a6efb0abf875d8b670fcaed4219ab6df78d6bb8cb32f3f140046a5f1e3babf629c60d4210562ab322d2e9b0274541a5b9bfdc1f4d255d439b7ce756e66970ce87683c6c345a97e0ae68af4bcb8c55235523a52221ef92e99de448cadbb1a577213febf6c9150aa44cb474d77dfe58c14be77abbb93e5b007e6567f2df8b9cc3c2ccc3f4be4a25c1d4ca11f4888f0de0a657b834c9b61c238b8256c898cf1fd99f5213e3c4569b9ea57fcb617f9dacb58f06e011a57aeb01e3299fec0576d6267b9a27e4559c3b1d719bf06826a87e5f3d864206e7475bb7dfdd7c811a0545e957509a60e78647a524c30fcbcad6b35916702c4313190c728d95ce25f09c5f159c7acc2fef2d32757aa5ddd9d1fb709994c35bca9effe8638edbdafc93af5dd766fe56d5fa3d706f41721fb1aa362f054c121b44db3297cbc4256bb6785d395c89b34b729d2ee4e71fa9fff8d6a0e89b5a716810ceb14920b48f0e21e56ea46e28c3fea4b456f2b7c586c73393870173fa3a06e0908ddb44e21dcfbb8b433eabd174350adc6a27ea74fca9864484893aa8c96f0bbcc1b2f7d0ac8d8bced327882acf2b36569a4c01a70fab328883dbd67252b5e18813d27a6331b9c810a2732e1d2334b3a06dc69d1955d1554d8bf5ea1760995dd7ab1ed6248b18ac53e80e872ef55c702e5f1d34b55f944108e7d51f35b7d3c6a92a116a08e4cce6df69cfb36fbaf5eec5523241d27103bd2859cc1e54aa65968ff27e068bf73a3596e650196b536925acb012f6dbfdb315935516c4f1845a912b161f065a1c774baa23196fbda0cf490082bd8a4d9363868d6eb919baf8ccae1057534ce790a658ff11a522fa558c27a81c4ca0308f7c504b90dcabfb948cc9d7b84832bc2fd5e56f3f7d2b39f77c1746bb410e17cbcde6f0dce8e86bbd93722039bdc3675c438fefb5530092e525936654a251508ff8490813f68cabcfe15d25f973d9e5ffda86e42e0afd165e497ef682b82f2ed81937c66963cf0597deedf20b6e34f28158a0e0ea4fb8a6db5547a80d7ce390368f913b51c8b4ded73a26263a7298b70c182d1018b16471499ba81d34c8b6d9d4563c748c1f5eba5fccab59b054256b726d09240e8047b88c8ebb32bb1fef928c6f50ee15458dafbd5a507d0867f2d4487edd1ad94e7e158be5321772cb43d959e832225d8c2fdfe9e3e2620cf54b201bc96422dc7445948718bbcb52cccdf2c56a78446fab39e656101b27807fcb7c1b8c100f9978339a427a76f7581789a4dbe1801b9e34b93d554c4759de870533837246442a2962aba73030a11520cd6d67551a30c850ad820af5f454af8566e06ea1edb7bc822f509a64a5a418a14960bd236e0de591f5271d4eea0cd1c7aa3cfe83947af51545433a92bb5819e5d3319c079d356a14f88215d712095b055d902db24e6462e9e3740a1d90c0624c1998623ea0b0fbff23b7272b13bbffbf2bf883ac66eef7aa3c71ff037d09104d6d7b3cd7ba9519e897a841da66665191347aab28c348ec9c6472fc2d88af8a3d1d42689977b4eff87425f9529e6c28dcd428a630b79bf210ebead5c8b944945ed7cc23c8e1bdeefac8effa2da8ae495958c52d0b016e9489169d5f8bccdb4a775bc93f311f75166e69b7f4d3a59d066e61a62c278ba3250df26a0cae5", 0x1000, 0x6}, {&(0x7f00000016c0)="a0fa4fd43e46b68555087f462185e13c0443bd5fb5b030e229e00915fb5f65cbeed7e84587dc3ed544c5dec4b6d793692929d7b00dbfca32485a54ddfef660ae5846163ed7102d6bcc2e505ed5d3f851bf752887ab7ddb7a94d66bbac65dd8876ca526aef85b36557338a344c220972e", 0x70, 0x79d1}, {&(0x7f0000001740)="41ede0401cb62d042b6bfc440dd058867553ffed3edb894e4d29f630d897263d335217afa4c642501917b3bad2243b31212f4296a85b990765479cdc1a17fd324efa6b87ee2b533bb40db3bb771126998b9ca4a393cfcf04e36a3456eb56053be28fbd5348de91", 0x67, 0xce97}], 0x1000000, &(0x7f0000001880)={[{@bsdgroups}, {@data_err_abort}, {}, {@dioread_nolock}, {@journal_async_commit}, {@norecovery}], [{@audit}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@uid_gt={'uid>', r0}}, {@dont_hash}, {@audit}, {@fowner_eq={'fowner', 0x3d, r1}}]}) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f0000001940)=@generic={0x15, "8a86ad90b31cd572a2f46ee6a1dffc7eeba5d5042737f7ef9c5cac1be961606e9b20025c38ae79baa3153cea89b3f083f1b2aaec30f6d5e0042b4f45530b002f92081043b7a2078338e24edc46bb20d458141c861f0ddd27bc50f754c401ed9386761ce953f0dd508d03a0435f361e03b1fb9ec665154c5dabc637a9b93b"}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000019c0)="afe2238f620d72f34db847ad0c8625faa36bced61153f3f31175670499c12ea2d983d3e197f946bb0f031379660523ae7048cfb633702dadc4defaea6e04f11e4d885cda86fae1c8a041f711581638c21ebf2de7c2a827391f9090c977644323a41b7c3f63689baa495fdba027cbc42e80b155b3c1239a5fcc5ca3d419b5aa32e437b137be5d19cbd05cce5d0228f78746fe9e40d39313333c520711223a5c53e77fd246c7b3638ca2d9f6be30e81e8ac99fe299a61e6484ec56f5acc1eeae99cbe59d88c6b32229a635de7485ab02fc0af7e50f2cf48a8647595ddc103b8db4f9cd256246ec4f7acb74d5ce2e6ca643", 0xf0}, {&(0x7f0000001ac0)="edd358e79cfb79bbf5323c143f68cc4b7001e475686f99f8627de374bbbf67ab6b7e6594155ba7fa595f47a71602c0b39ffe72df8d2840cf11e75de249d1c5369823481c77d9aadf6734d738b60e1c84254eac7ce2a3393b0473dc2928567776959612b8e49f181889f6de9fe990caea0a41f24aab1c0fb77bba09bca74061326cdcc0209369c50dcf58", 0x8a}], 0x2, &(0x7f0000001d00)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xdcd}}, @mark={{0x14, 0x1, 0x24, 0x296464c5}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0xd3fc}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0xd8}, 0x24044800) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:26:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:26:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8008, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000680)='./file0/file0\x00', 0xe1e, 0x7, &(0x7f0000002900)=[{&(0x7f00000006c0), 0x0, 0x3f}, {&(0x7f0000000700)="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", 0x1000, 0x7}, {&(0x7f0000001700)="275384b91025c08d6668d659aa0756f3f5bc3e37c7521d5d970d9bb14cc7739a3d15a4328909be277f73489e7704f934492f4d64c1210cf15a46c0ed652bbcd3ab79eb68d3a383b0cc659d9a72638e56a8d1ed89c33baef6edcc589e05b7f9e3ba", 0x61, 0x7ff}, {&(0x7f0000001780)="c9da0b172be3069c8f03e2883848ea45736ecfb0ccd2e13c405858976e5dcd1cbf1a40601279be", 0x27}, {&(0x7f00000017c0)="960dd35b2f8062674dcce10e8f3575ae9a11f2819d839a05cd18ae76e4fd88564da60996e165c279c3b75f80231f7549b65f622a5f7e", 0x36, 0x3}, {&(0x7f0000001800)="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", 0x1000, 0x7}, {&(0x7f0000002800)="d0609d7490485f6b8c4804b4b67af51df53fae1c49258f860f8cb7a8f52e712622e9a8f0154ec298fc78a67ea44883195ded0c61f3a84ad7f3f48faa448cd2e113966b69b7c2f4cae0ec59aa31627ab8d33dea2e64d1015b1b4b5d46aa965aa6481db1d007ba421717065e695005b24bcff95521889cbe373d59226a2758c6c8bf40f19b2831b063ca5fd57822b0a50e734d836b5db851c9d59e2a6cc6b5cafe7f4c106305f660e7c18f79ed900ca0b83f1003da92d86641289959ec0a02d7f1f3d6354b6200cb679a5fa3f8ddfe022aaeb0e8414ed7c08c589a", 0xda, 0x4}], 0x1000080, &(0x7f00000029c0)={[{@rodir}, {@shortname_lower}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fowner_gt={'fowner>', 0xee01}}, {@euid_lt={'euid<', 0xee00}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) statx(r0, &(0x7f0000002a40)='./file0/../file0\x00', 0x2000, 0x2, &(0x7f0000002a80)) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000500)="028f32bd9482a3ecdfc45e6c1e2e8745ac2e4001481b43aab8509105aaf0c1c6db893f22faf8d40a7ce124390fadf6879c8195ed10f5efed0d8654072ad263674143238541b46aa16c0a8175b6d723211b4ccc3c929653233d8ef57f203c3be210e97cd6b17ec9217118e5e489b4d161a1cb5668f289d396eec0bead542a4bd46c7f0f6f6a49581d005f4539a8d5e482eaab06c380dd635ac4f663b12f38bfec9cbc4af588174ebf1fee1c0b2d82de589881dc2e48c544dae41f7dae6dcf743b4e290e7e7523be45289041e0fb4bad39ce457d3de73e34d39cccac1e6f53", 0xde, 0x20000000, &(0x7f0000000600)=@abs={0x0, 0x0, 0x4e20}, 0x6e) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380), 0x24000, &(0x7f0000000400)=ANY=[@ANYBLOB="7472616e733d756e69782c63616368653d6e6f6e652c70726976706f72742c6d6d61702c6d6d61702c64656275673d3078303030303030303030303030666666662c756e000000000000216673002c76657273696f6e3d3970321030302e4c2c6163636573733d636c69656e742c6d6561737572652c736d61636b66737472616e736d7574653d2c7375626a5f757365723d275d282a5d5b212c00"]) 09:26:40 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) 09:26:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) 09:26:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b35, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:26:40 executing program 6: lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000140)={'L-', 0x9}, 0x16, 0x1) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) io_setup(0x3e7, &(0x7f0000000580)=0x0) io_submit(r2, 0x1, &(0x7f0000000a40)=[&(0x7f0000000080)={0x4004800, 0x500, 0x0, 0x0, 0x0, r0, 0x0}]) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x7e) r3 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80000) dup3(r0, r3, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 09:26:40 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000480)=ANY=[@ANYRES64=r0, @ANYRES32=r1, @ANYRES32, @ANYRES16=r2, @ANYBLOB="8c337f", @ANYBLOB="cab77d832a51fe580500000000000000d34b9430a700000000000000000000000000003179291eca6501a2bcb57b21702b698d8832dab86e9f61b423d7cad13b948d0b64354aedc7ec54632249da8b8a1f943a3ae87ef4db1f788332d3bd2a89445b5c59a64ebf96c0b4f9b64ed1bdf491cc94e11a75de354ccdc74563391cd01f3362047b796e91ba3896b39aef61c772ca0a9219d38d8d07b02a947f8f665ed9eb28ba8f9eead63fee00"/180, @ANYRESDEC=r2]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1609.480978] FAT-fs (loop4): Unrecognized mount option "uid=00000000000000060928" or missing value 09:26:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1609.541483] FAT-fs (loop4): Unrecognized mount option "uid=00000000000000060928" or missing value 09:26:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) [ 1609.567583] FAULT_INJECTION: forcing a failure. [ 1609.567583] name failslab, interval 1, probability 0, space 0, times 0 [ 1609.569207] CPU: 0 PID: 8537 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1609.570212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1609.571366] Call Trace: [ 1609.571727] dump_stack+0x107/0x167 [ 1609.572218] should_fail.cold+0x5/0xa [ 1609.572735] ? create_object.isra.0+0x3a/0xa20 [ 1609.573362] should_failslab+0x5/0x20 [ 1609.573928] kmem_cache_alloc+0x5b/0x360 [ 1609.574468] ? lock_release+0x6b0/0x6b0 [ 1609.575031] create_object.isra.0+0x3a/0xa20 [ 1609.575611] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1609.576289] __kmalloc+0x16e/0x3f0 [ 1609.576773] ext4_find_extent+0xa3d/0xd30 [ 1609.577347] ext4_move_extents+0xaeb/0x3270 [ 1609.577995] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1609.578735] ? SOFTIRQ_verbose+0x10/0x10 [ 1609.579270] ? find_held_lock+0x2c/0x110 [ 1609.579824] ? lock_acquire+0x197/0x490 [ 1609.580356] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1609.581105] ? lock_release+0x6b0/0x6b0 [ 1609.581692] ? __fget_files+0x296/0x480 [ 1609.582227] ? rcu_read_lock_any_held+0x75/0xa0 [ 1609.582850] __ext4_ioctl+0x304d/0x41c0 [ 1609.583374] ? __lock_acquire+0xbb1/0x5b00 [ 1609.583954] ? ext4_reset_inode_seed+0x450/0x450 [ 1609.584588] ? perf_trace_lock+0xac/0x490 [ 1609.585157] ? SOFTIRQ_verbose+0x10/0x10 [ 1609.585741] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1609.586541] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1609.587234] ? do_vfs_ioctl+0x283/0x10d0 [ 1609.587770] ? selinux_inode_getsecctx+0x90/0x90 [ 1609.588390] ? generic_block_fiemap+0x60/0x60 [ 1609.588995] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1609.589693] ? ext4_fc_start_update+0xa2/0x2e0 [ 1609.590297] ext4_ioctl+0x46/0x90 [ 1609.590750] ? __ext4_ioctl+0x41c0/0x41c0 [ 1609.591297] __x64_sys_ioctl+0x19a/0x210 [ 1609.591813] do_syscall_64+0x33/0x40 [ 1609.592313] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1609.593023] RIP: 0033:0x7fe0be643b19 [ 1609.593541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1609.595989] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1609.597060] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1609.597965] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1609.598956] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1609.599916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1609.600887] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1609.602170] hpet: Lost 1 RTC interrupts 09:26:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0/file0\x00', 0x4, 0x8, &(0x7f0000000800)=[{&(0x7f0000000400)="d3fe01d4b9c196c7eef5c35c688ebf4fc18d133012b10ef590597a83e93a573abe51989973cc14bcdb70deeb1db90789d0037b33e134de4c9a59ff8c3369b6e7a57ea1335fa9e3d8fa6a48cddd64806583748a9ef50778640e0413a04552871eebcb5e95b1270a5e9619478bf4f733f0a5f2b07e7234838ddb9b471affe025dce31547940910fd583f3c880fa63c7d0a765f91acf7b9f0a3d5ba929bd503a92bf381ff0145bee665", 0xa8, 0x4}, {&(0x7f00000004c0)="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", 0xff, 0x5}, {&(0x7f00000005c0)="686f8b73caa9288c9b5250f3ece5fa025d8cc90813213f3c0bab3bfcf71476fcb15015aed845d9d20a9f770073c1859301eb44d17fd7fd90096446b5e97e8aa18676de1bc59a98fd9a7192b661cc24b3f66f65e79a103a6ed61d77a718588622400f8cb9aa3bd7e3dd8cd4633b552eca7ba15e6e639441a699", 0x79, 0x5}, {&(0x7f0000000380)="4477844242f9a2adda82f67f28972d7dd7dbb3c7bcc7583e45bcf103f06c94961a44a24e3e", 0x25, 0xff}, {&(0x7f0000000640)="b00849cbdf5cb4b5c0e3ee1fcf5750a87cca562e23a4bfa484ba6237d3ce82662c84549f65f5f55674ebc1e29938c7f41f41a469653733b0ec62a2ee40e5952e7a4fe031101aecdb1443b1945bb0cb52aebb8f8220bb7f3440d6be1c2026ee5292fc84c705a5bb559d20c08bf743a36b572f86eb6764", 0x76, 0x8}, {&(0x7f00000006c0), 0x0, 0x4}, {&(0x7f0000000700)="8f5236e7eb16501415d7", 0xa}, {&(0x7f0000000740)="fe631aac003a3558c7b5ebc34987ebcc3ac0e6d833fcc488d986f763fbb200023a177315ef49ec53fca5267aca9836a8c290a3b39ef49cd7fb8fe24b17385b2e6035a83ca521e8856a9d71e8dc00358e6ef2fe453c7f048c28a19b27e61255bd751b119e9ac0a509545561802ac68537f9f7a73761a8e450e02dd9ebd828e1e872765b52d32894a268dc6a191a0ca5fe845dd79cfe3e19dd1e681fb456cb5f7936a5835fdcc958f17ac8fad0f5a4f4dd227bdb2d351a1b6fe2dcdce17e414723", 0xc0}], 0x2009000, &(0x7f00000008c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x32, 0x6b, 0x65, 0x70]}}], [{@permit_directio}, {@euid_lt={'euid<', r0}}, {@smackfstransmute}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@subj_user}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x64, 0x33, 0x36, 0x64, 0x38, 0x36, 0x35], 0x2d, [0x63, 0x30, 0x35, 0x58], 0x2d, [0x63, 0x33, 0x37, 0x30], 0x2d, [0x39, 0x33, 0x33, 0x61], 0x2d, [0x62, 0x65, 0x30, 0x37, 0x63, 0x30, 0x38, 0x31]}}}, {@dont_appraise}, {@subj_user={'subj_user', 0x3d, '):,\xab^'}}]}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:26:40 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:26:40 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b36, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1609.856251] serio: Serial port tty32 [ 1623.891581] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:27:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:27:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x7, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000400)="54057c822b7d49bd9811a9535f47be4b768c893fa52043e71a26bd9806161d820e3d35a14224dd7d9b0a49ce86c32214c4dd7222e0fc2dd7330d792ebf52c62868a0d95156b6e35deba71ee4ba6f3416ae67791e54588cd72cc43ed678c560498d11923eea604647534c5a0dd6df1890f85ec90c9c53edebead7440efaeab310b02902944c4bc789dd6a72ba5b8188931ea7d8207e10d83d17", 0x99, 0x1}, {&(0x7f0000000380)="ad3f5427d8de8dd21e16372e39e1a461d50e87037623bc0a44518615ec354e3800aebd36192ad38da10592b7a2079a7422b2a33886b392", 0x37, 0x200}], 0x18, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) chroot(&(0x7f00000005c0)='./file0\x00') umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:27:03 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0/file0\x00') mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file3\x00', 0x0, 0x877852, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) linkat(r1, &(0x7f0000000380)='./file1\x00', r0, &(0x7f0000000440)='./file0/../file0\x00', 0x0) 09:27:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 4) 09:27:03 executing program 6: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd67b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="580000002300100025bd7000ffdbdf251e000000eb22a60a77839ff325ab579de9c0eff9b56c2874450ed3baefa7a50ed0b2dc9fdedb157231bc50194607299851a6ecf3f5c9327b7b5b559ec4ad37e9ffad506026000000"], 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000081) r1 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x40, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x40050, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x200, 0x2}, 0x400, 0xc8, 0xffff, 0x8, 0x8, 0x9, 0x81, 0x0, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) r2 = creat(&(0x7f0000000000)='./file2\x00', 0x0) read(r0, &(0x7f0000001980)=""/125, 0x7d) recvmsg(r2, &(0x7f00000018c0)={&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000340)=""/40, 0x28}, {&(0x7f0000000380)=""/26, 0x1a}, {&(0x7f00000003c0)=""/152, 0x98}, {&(0x7f0000000480)=""/33, 0x21}, {&(0x7f00000004c0)=""/219, 0xdb}, {&(0x7f00000005c0)=""/145, 0x91}, {&(0x7f0000000680)=""/100, 0x64}, {&(0x7f0000000700)=""/11, 0xb}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x9, &(0x7f0000001800)=""/182, 0xb6}, 0x62) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001900)={r1, 0x20, 0xffffffff, 0x8}) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x7}}, './file2\x00'}) getdents(r5, 0x0, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000001940)) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:27:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b37, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:27:03 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:27:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) [ 1632.446457] EXT4-fs (loop4): unable to read superblock 09:27:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) 09:27:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b3a, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:27:03 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:27:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:27:03 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fallocate(r2, 0x0, 0x0, 0xc8a) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x1000}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 09:27:03 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) fchmodat(r1, &(0x7f0000000840)='./file0\x00', 0x141) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_rdma(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', &(0x7f0000000740), 0x801, &(0x7f0000000780)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@sq={'sq', 0x3d, 0x80}}, {@common=@privport}, {@sq={'sq', 0x3d, 0x3d}}, {@timeout={'timeout', 0x3d, 0x100000001}}, {@common=@afid={'afid', 0x3d, 0x1}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}}) preadv(r0, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/9, 0x9}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f0000000400)=""/149, 0x95}, {&(0x7f00000004c0)=""/16, 0x10}, {&(0x7f0000000500)=""/32, 0x20}, {&(0x7f0000000540)=""/61, 0x3d}, {&(0x7f0000000580)=""/23, 0x17}, {&(0x7f00000005c0)=""/114, 0x72}], 0x8, 0xfffffff8, 0x1) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1632.562251] FAULT_INJECTION: forcing a failure. [ 1632.562251] name failslab, interval 1, probability 0, space 0, times 0 [ 1632.565481] CPU: 0 PID: 8585 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1632.567066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1632.568860] Call Trace: [ 1632.569443] dump_stack+0x107/0x167 [ 1632.570254] should_fail.cold+0x5/0xa [ 1632.571108] ? jbd2__journal_start+0x190/0x890 [ 1632.572103] should_failslab+0x5/0x20 [ 1632.572934] kmem_cache_alloc+0x5b/0x360 [ 1632.573849] jbd2__journal_start+0x190/0x890 [ 1632.574815] __ext4_journal_start_sb+0x214/0x430 [ 1632.575857] ext4_move_extents+0x10c8/0x3270 [ 1632.576861] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1632.578032] ? lock_acquire+0x197/0x490 [ 1632.578938] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1632.580076] ? lock_release+0x6b0/0x6b0 [ 1632.580954] ? __fget_files+0x296/0x480 [ 1632.581852] ? rcu_read_lock_any_held+0x75/0xa0 [ 1632.582874] __ext4_ioctl+0x304d/0x41c0 [ 1632.583741] ? __lock_acquire+0xbb1/0x5b00 [ 1632.584676] ? ext4_reset_inode_seed+0x450/0x450 [ 1632.585718] ? perf_trace_lock+0xac/0x490 [ 1632.586621] ? SOFTIRQ_verbose+0x10/0x10 [ 1632.587538] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1632.588785] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1632.589923] ? do_vfs_ioctl+0x283/0x10d0 [ 1632.590807] ? selinux_inode_getsecctx+0x90/0x90 [ 1632.591835] ? generic_block_fiemap+0x60/0x60 [ 1632.592816] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1632.593898] ? ext4_fc_start_update+0xa2/0x2e0 [ 1632.594906] ext4_ioctl+0x46/0x90 [ 1632.595663] ? __ext4_ioctl+0x41c0/0x41c0 [ 1632.596568] __x64_sys_ioctl+0x19a/0x210 [ 1632.597461] do_syscall_64+0x33/0x40 [ 1632.598286] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1632.599399] RIP: 0033:0x7fe0be643b19 [ 1632.600240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1632.604230] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1632.605890] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1632.607436] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1632.608982] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1632.610552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1632.612096] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1632.613960] hpet: Lost 2 RTC interrupts 09:27:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$cgroup2(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x2000, &(0x7f00000005c0)={[{@subsystem='rdma'}, {@memory_localevents}], [{@fsuuid={'fsuuid', 0x3d, {[0x63, 0x34, 0x35, 0x39, 0x64, 0x35, 0x35, 0x31], 0x2d, [0x33, 0x56, 0x63, 0x39], 0x2d, [0x34, 0x34, 0x4b, 0x62], 0x2d, [0x34, 0x32, 0x63, 0x32], 0x2d, [0x63, 0x63, 0x32, 0x37, 0x32, 0x62, 0x32, 0x3]}}}, {@dont_appraise}]}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380), 0x3811480, &(0x7f0000000400)={'trans=unix,', {[{@afid={'afid', 0x3d, 0x100000001}}, {@version_L}, {@access_client}, {@version_u}, {@access_user}, {@cachetag={'cachetag', 0x3d, '*'}}, {@afid={'afid', 0x3d, 0x7ff}}, {@version_u}, {@version_u}, {@version_9p2000}], [{@hash}, {@obj_type={'obj_type', 0x3d, '-'}}, {@subj_role={'subj_role', 0x3d, 'tm>\x03>\'\xa5s\x00'}}, {@uid_gt={'uid>', 0xee01}}, {@dont_appraise}, {@dont_hash}]}}) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x295018, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) syz_mount_image$tmpfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0xe6, 0x4, &(0x7f0000000a40)=[{&(0x7f0000000700)="5578f53e8c38e54ab3d0bffe63a0fffca683e0cbe03241ce488d9c6c71319f6d198edc5f9d5ea9866ed85122ea084ade1e68ee469afe91385309ef890188fd0c10133c2a069a7e6ecbac47db7ce2b7db67a3449a5cb050de482cba81c1b4a1fe720b672b10a72402b0a52aaa7949e4e21c2e8e2578c16d263658f5c47ce4c4", 0x7f, 0x4}, {&(0x7f0000000780)="1858949c878fa3fb5bcee237dab174f8aede3b1378e56a0b73ca42107ef439fb9e5832af0bef52b31cf3587c7f6d591a4c33b3dca326bca72bd879fc840f5735710bfc39dc212209759b329ad119af0df88701de6578cfafa7118e0415a5192227414baae4dc7e9539d954184f6afa61f85f1555963b87b2b617051de9e65dd2973197a998c402eaf76bbeeb3f5f78b6a035dc726c590ed1b9afe0890925a3f319ad4f993f00c3ec116408bd42d23b81d6cd60da97355f31de2de66be83bc96fbf2dc0884e1129ea9a0fdfd3c1834b47cf57b4fe88e951", 0xd7, 0x7f}, {&(0x7f0000000880)="4a6e3a3ca1a866ddfa02a818d8138d2ecc1e6bc320901ec8498bd7a61d34ba023188aa03cf5758d515e4295e0cec6adf8f3c56871939060c28277dca5a7df5898c500b1e003b721ae587652493f87e9ca4657056c53e04845457c59a7b81e9fe187a12ac8a33358c44db1e522ac1aa89f80eefecb0c3d36b18dc847530e365b68cf61be76cb4ee363f6ef69e3c3c8be135383ee2d43a0f26c0a48b95046b370b52419cffcf41bcac0a286613b77e6c2818dfda98c1e988ca422f0d77a01c74b7b4a21a640aa2676b8e70ed0f6c04d49007b800678243a56781979af27cdaaa", 0xdf, 0x4}, {&(0x7f0000000980)="b72cde61b2540bc582a0e7b2b1277f86d1266af087d5124dbb3091832774fcec8a5150e43f6d45d4d0eeae93fcd7a812da054a14918478767236b53af7bce60b9869a668f4c6ecb8334c3b8592998cd0df56e225f866891287e84e5be99e63951cbee890cbc165b62d4567d57dc5a0c1f013185893cc50a39fa39e540b9a003f87e867718653bff34356254fd307710717f950640bf7b06699c3e18daa767b54bf2e39fa135e26a4db1494c80993cdd6bf6100817f74937537", 0xb9}], 0x812003, &(0x7f0000000ac0)={[{@huge_always}], [{@dont_appraise}, {@obj_user={'obj_user', 0x3d, 'cachetag'}}, {@dont_measure}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000640)='./file1\x00', 0x42000, 0x20) 09:27:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)}], 0x1}, 0x10044001) 09:27:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b3b, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:27:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:27:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 5) 09:27:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1632.997677] 9pnet: Could not find request transport: rdma 09:27:04 executing program 6: syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r1, 0x406, r0) bind$unix(r2, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) [ 1633.029554] 9pnet: Could not find request transport: rdma 09:27:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b3c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:27:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) [ 1633.342015] FAULT_INJECTION: forcing a failure. [ 1633.342015] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.344508] CPU: 0 PID: 8626 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1633.345907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1633.347581] Call Trace: [ 1633.348132] dump_stack+0x107/0x167 [ 1633.348878] should_fail.cold+0x5/0xa [ 1633.349669] ? create_object.isra.0+0x3a/0xa20 [ 1633.350616] should_failslab+0x5/0x20 [ 1633.351396] kmem_cache_alloc+0x5b/0x360 [ 1633.352236] create_object.isra.0+0x3a/0xa20 [ 1633.353137] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1633.354204] kmem_cache_alloc+0x159/0x360 [ 1633.355064] jbd2__journal_start+0x190/0x890 [ 1633.355964] __ext4_journal_start_sb+0x214/0x430 [ 1633.356942] ext4_move_extents+0x10c8/0x3270 [ 1633.357884] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1633.358975] ? lock_acquire+0x197/0x490 [ 1633.359787] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1633.360851] ? lock_release+0x6b0/0x6b0 [ 1633.361683] ? __fget_files+0x296/0x480 [ 1633.362530] ? rcu_read_lock_any_held+0x75/0xa0 [ 1633.363486] __ext4_ioctl+0x304d/0x41c0 [ 1633.364290] ? __lock_acquire+0xbb1/0x5b00 [ 1633.365166] ? ext4_reset_inode_seed+0x450/0x450 [ 1633.366142] ? perf_trace_lock+0xac/0x490 [ 1633.366986] ? SOFTIRQ_verbose+0x10/0x10 [ 1633.367844] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1633.369009] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1633.370072] ? do_vfs_ioctl+0x283/0x10d0 [ 1633.370904] ? selinux_inode_getsecctx+0x90/0x90 [ 1633.371869] ? generic_block_fiemap+0x60/0x60 [ 1633.372786] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1633.373798] ? ext4_fc_start_update+0xa2/0x2e0 [ 1633.374737] ext4_ioctl+0x46/0x90 [ 1633.375450] ? __ext4_ioctl+0x41c0/0x41c0 [ 1633.376296] __x64_sys_ioctl+0x19a/0x210 [ 1633.377131] do_syscall_64+0x33/0x40 [ 1633.377927] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1633.378969] RIP: 0033:0x7fe0be643b19 [ 1633.379743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1633.383474] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1633.385025] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1633.386489] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1633.387940] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1633.389413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1633.390922] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1633.392597] hpet: Lost 2 RTC interrupts [ 1648.063747] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:27:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 6) 09:27:27 executing program 5: sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x20, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x48011}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000880)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff}}, './file0\x00'}) syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0/../file0\x00', 0x0, 0x3, &(0x7f0000000800)=[{&(0x7f00000005c0)="fc2a6b9f21997912384d83f827a4f955b7dd6c33fa3746576bde2a224e64fcd496959d59fd7fea5e2a4625a7f739ba3fd6b382741b6361fec42f61d3addf05fa834aa63f8b4aad62d9bfaafd549281bd45a7f49b37bfd6b79056c1030f11514a326d7c39f510a6fe5e43a48312be80c1a297562ccfb585c7d185a10b669eae3c5e530446cea9096627f7f3", 0x8b, 0x3}, {&(0x7f0000000680)="796ebbf8a62fe5c7bd6e7245bbe63e245c581ad5453e345cf365c4a06c63356cabd1d055b0c82337cbdfc113f72d6666eca14c942728f79c58b034bbc69801028515c41edee1f5799c870ecf223fbd89eb3b1323cd17eb35388567", 0x5b, 0xfff}, {&(0x7f0000000700)="fc9aac2a90a9ab65d0c65652cc85afd88ae6b579f763116c7b765adac0f562505c71a73d0df2f7943f5fb67c5d72aa7497d414f13ede06f88f0b442eb271292a1916629b56779575a2871a53863931029bfc81913bc94803f9860657c6e0c98dfe76d6f1e6cdd48d009144b6d2f8ea7f221e28883abf2bdf3800ccdba45bd6323bdde88ef4db4e36bd563c997f31ea174bd1f9fb0512ee356fe76717e98daef5f231389921ced8275b28dbee2dd68264ac3adf938abdd1088634bd49f1db0eb2fa83da9b2a3d44918f743a745590ad0c747a62076fcf33e5493960a2a9f0", 0xde, 0xffffffffffffffff}], 0x1000004, &(0x7f00000008c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x6b]}}, {@size={'size', 0x3d, [0x32, 0x36]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x2d, 0x38, 0x78, 0x66]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x31, 0x2d, 0x0, 0x78, 0x6d, 0x30, 0x78, 0x30]}}], [{@uid_lt={'uid<', r1}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@euid_gt}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}, {@audit}]}) getdents(r0, 0x0, 0x0) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x101000, 0x12) mount$bind(&(0x7f0000000980)='./file0/../file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00), 0x10, 0x0) 09:27:27 executing program 6: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/sync_on_suspend', 0x531081, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/power/pm_async', 0x22902, 0x0) copy_file_range(r0, 0x0, r1, 0x0, 0x1, 0x800800000000) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x412200, 0x29f4a651f7d5ceec) syncfs(r1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) r3 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000000100)="17db2aef882c3929fb1f532977731b494aa95c5faf2ef4da9a2d2ab79c1635985fbbfcddf295479415f2515e7e1acd979d50f7fc8e8945febadcafe63e0f2084623e4ec38ea04abdbdbd3920d2bd5c5c95ffcb8a46f18fab7f2a7c902f3d9065f928ccd649c6ec61c3464020fd787d6ad09075f83aa607c34873714aab8112d738d64df2ae31dbc161dc17e192a5e888fa9b7a8050827fcafd42856ec8d3e65c0bc000ccc2a9f2a345968db28deae2a874cd48787ccd145e4566b30c8176ebc4268fd440ae0d4be85f69462b21cd698c20a5d3dce55634955ee6c4fda0ced88c39dcf7fdf3fc", 0xe6, 0x2}, {&(0x7f0000000280)="f35dfb175d2650affca6d1c9674e38e5495baad7f536267e8a30b1120a462696581f043618d7f1b90541ec80e9adb3b1cf9551fc6d3d54d76b0c19cf5779cf7d9128f792678b97e6be3edc7ba63de525ff4549ffc7d199d617f2e48bc8411f592b797c74ae785a2fb14ae28ad41f636266e26e156dde0f76219dd9c6611357029f2a95865d61cea5567e798de01d313f12dc4b", 0x93, 0x7}], 0x191c012, &(0x7f0000000340)={[{}, {'++'}, {}]}) r4 = signalfd(0xffffffffffffffff, 0x0, 0x0) r5 = timerfd_create(0x2, 0x80800) r6 = eventfd2(0x40, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x84009422, &(0x7f0000001380)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_RM_DEV_V2(r5, 0x5000943a, &(0x7f0000002080)={{r6}, r7, 0x2, @inherit={0x50, &(0x7f0000000000)={0x0, 0x1, 0x5, 0x0, {0x22, 0xc66, 0x7fffffff, 0x7f, 0x6}, [0x9]}}, @devid=r8}) ioctl$BTRFS_IOC_RM_DEV_V2(r2, 0x5000943a, &(0x7f0000000380)={{r3}, 0x0, 0xe, @unused=[0x9, 0x3f, 0x3000000000000, 0xff], @devid=r8}) 09:27:27 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b3d, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:27:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f00000002c0)='./file0\x00', 0x6) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) pivot_root(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)='./file0/file0\x00') setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000380)='./file0\x00', 0x5, 0x9, &(0x7f0000000980)=[{&(0x7f0000000400)="5b666ef5", 0x4, 0xff}, {&(0x7f0000000a80)="92e9c7ea9bfd2d3bd76cfeec6952d1d357b4f8480415158ef2453c77968dd4dc01b628f279fb0ee0aab6bb7a65c1f8b9ead459564003597287b4e85a7a750abe60129678b4a2111e", 0x48, 0x6}, {&(0x7f00000004c0)="ddd26bc10a182c2a1f07d1743e18a4887af575dfcf52a25fcadc2cde79c317e41b4629003714c4b08260e756b7c56ddb1b2e67649fe60acf3ff1a4e965a6126c1111dc8fa9bead88d7aa4384deb39b8cec5c9ebf51b2a8731c182dc3a3d750abcc97acec23028201e76f59b658245ed028", 0x71, 0x2}, {&(0x7f0000000540)="ec33ca0f927d73bab13f3f675d341135371e54279983cd6ab45695828fe398ab7db22fd97797aaf6361ba791b0f9ac171d34744bb4f89fa07ce3a942b9fe80d2003635754bb3ef3fd94d667acea39b64af7f7dd4808403454dae01508ea0de4cba48aa721bd849e1dfa284560fa52b238d677cdc256bed960a07a505ead96777565e1206383eb9e250923100440bb079ba31490be9ffa745e9e1531387", 0x9d}, {&(0x7f0000000b80)="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", 0x112, 0x5f8a82fe}, {&(0x7f00000006c0)="941845cf85c5c61364d0012672b129c17e31cc0d16806f7e00aed98944f26829f2f35f74634c21067fa9b0585d155634eea2c4eab14b394e4fbfe8b519b6fe58e61b483b9e288d01750f0fd8456e4e46b3cb950c016c58cffb45611c550769ac01743a5a1b9b4239ec51273035743cd07b9d9ed99c179cbb47ba44743a1f3a0d4505bb84ae402c085113952fb986804a90ca2182c14397de5b5d2c4227babd83e0d93cb98115384e00d38d6baa69cb6de813d4887876bb48c86fdef3e1", 0xbd, 0x40002}, {&(0x7f0000000780)="4522514075b8ed8cb734e255e67fa3fc6e90b04d5b4b007e21113fca5a242ccc06703a6577bdabb4971676bb10555f3953f94a85c9e4df0850041f653f645a6e7a191247aa4b2e21c8da01d30d40e5dc7b72e8c8ddde5d50314b9b13bb4128d3c479db0d6a3379e91bc26623db3233c7d2975e563d9efdd7f1e1e3c1e84437467988e4e4", 0x84}, {&(0x7f0000000600)="f5c2d9ec98d5a41ea9835b8d3d0defc29674d7c6ffed2bcf327bd768a7e86bcffbb0b978811e2a5201a071ff0a369fee673df6e9768f64b68f13681cede78a1294536b5096b990725525731755976f276d9bab0e", 0x54, 0x2}, {&(0x7f00000008c0)="c5b108311d9855a9111157ca66e80f1e2f8247003367a11a9c54d20c76b4b53f94b920e8f70e4a090ac2a20feaa691f37a85c5b51841c79a33b8f57d2d8d6242529fec437dfebe9393a9b2c66113e984958f44b5f49f1a050f51d8ce349def69eb6b6b59d684895aa99b5bc4857555b5098246fc1818d83738e32459df346e43e7c9782e25a5fa2fbf4e7102a9", 0x8d, 0x187}], 0x20084, &(0x7f0000000b00)={[{@shortname_win95}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@obj_role={'obj_role', 0x3d, '\xb5#'}}, {@subj_type={'subj_type', 0x3d, 'tmpfs\x00'}}]}) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x14) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) setuid(r1) mount$bind(&(0x7f0000000680)='./file0\x00', &(0x7f0000000840)='./file1\x00', &(0x7f0000000880), 0x580e213, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00), 0x4, &(0x7f0000000d40)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}, {@access_uid={'access', 0x3d, r1}}, {@version_9p2000}], [{@euid_eq={'euid', 0x3d, r2}}]}}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:27:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:27:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) 09:27:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) [ 1656.601894] tmpfs: Bad value for 'nr_inodes' [ 1656.696521] tmpfs: Bad value for 'nr_inodes' [ 1656.769191] FAULT_INJECTION: forcing a failure. [ 1656.769191] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1656.771150] CPU: 1 PID: 8658 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1656.772097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1656.773197] Call Trace: [ 1656.773596] dump_stack+0x107/0x167 [ 1656.774129] should_fail.cold+0x5/0xa [ 1656.774698] __alloc_pages_nodemask+0x182/0x680 [ 1656.775352] ? xas_start+0x156/0x530 [ 1656.775868] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1656.776726] ? xas_load+0x66/0x2c0 [ 1656.777223] ? find_get_entry+0x2d9/0x6e0 [ 1656.777790] ? mark_held_locks+0x9e/0xe0 [ 1656.778376] ? __jbd2_journal_unfile_buffer+0xb0/0xb0 [ 1656.779092] alloc_pages_current+0x187/0x280 [ 1656.779719] __page_cache_alloc+0x2d2/0x360 [ 1656.780327] pagecache_get_page+0x2c7/0xc80 [ 1656.780924] grab_cache_page_write_begin+0x64/0xa0 [ 1656.781590] ext4_move_extents+0x1216/0x3270 [ 1656.782343] ? lock_acquire+0x197/0x490 [ 1656.782885] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1656.783632] ? lock_release+0x6b0/0x6b0 [ 1656.784188] ? __fget_files+0x296/0x480 [ 1656.784762] ? rcu_read_lock_any_held+0x75/0xa0 [ 1656.785399] __ext4_ioctl+0x304d/0x41c0 [ 1656.785998] ? __lock_acquire+0xbb1/0x5b00 [ 1656.786636] ? ext4_reset_inode_seed+0x450/0x450 [ 1656.787285] ? perf_trace_lock+0xac/0x490 [ 1656.787864] ? SOFTIRQ_verbose+0x10/0x10 [ 1656.788461] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1656.789263] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1656.789970] ? do_vfs_ioctl+0x283/0x10d0 [ 1656.790553] ? selinux_inode_getsecctx+0x90/0x90 [ 1656.791206] ? generic_block_fiemap+0x60/0x60 [ 1656.791829] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1656.792515] ? ext4_fc_start_update+0xa2/0x2e0 [ 1656.793159] ext4_ioctl+0x46/0x90 [ 1656.793631] ? __ext4_ioctl+0x41c0/0x41c0 [ 1656.794239] __x64_sys_ioctl+0x19a/0x210 [ 1656.794810] do_syscall_64+0x33/0x40 [ 1656.795314] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1656.796003] RIP: 0033:0x7fe0be643b19 [ 1656.796524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1656.799078] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1656.800109] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1656.801101] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1656.802106] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1656.803084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1656.804183] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1671.023813] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:27:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 7) 09:27:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x0) 09:27:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:27:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b40, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:27:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:27:50 executing program 6: pwritev2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="85ac7b310e63365ee9c41960ed6f1b84e9ade9f4ce8fde4398c8486249ff029336eb7e4b2ff729cf641b11877afc564e2d69732388f53a8b67d3e0fbff8d630b73f98a92b00e59515a35f7a69b2faef4661afa4e7b5b90b8c013300b242bd4879317db63084ba69c1e0494e8fa1bacb39f2a3da28c672573e856fe9e4ff3fbffd9cee987c269bf579d4e4c0d56578f3bb2", 0x91}], 0x1, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)) close_range(0xffffffffffffffff, r0, 0x0) r2 = io_uring_setup(0x7410, &(0x7f00000003c0)={0x0, 0xbb45, 0x8, 0x1, 0x5a}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000440)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x3, 0x8, 0x301, 0x0, 0x0, {0xa, 0x0, 0xa}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSEREQ={0x8}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x4000080) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x3) ioctl$TUNSETQUEUE(r3, 0x400454ca, &(0x7f00000000c0)={'erspan0\x00'}) write$binfmt_elf64(r3, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003c00"/888, @ANYRES32=r0], 0x378) 09:27:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x311859, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:27:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r0, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r1, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x3c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r0}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x44000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x100000001, 0x0, 0x0, 0x3080004, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x418300, 0x61) mount$bind(&(0x7f00000004c0)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = dup3(r2, 0xffffffffffffffff, 0x0) unlinkat(r4, &(0x7f0000000680)='./file0/../file0\x00', 0x200) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x80, &(0x7f0000000580)={'trans=unix,', {[{@cache_mmap}, {@version_u}, {@version_u}, {@nodevmap}, {@noextend}, {@msize={'msize', 0x3d, 0x48e}}], [{@euid_eq={'euid', 0x3d, r3}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'trusted.overlay.origin\x00'}}]}}) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) getxattr(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.origin\x00', &(0x7f0000000400)=""/157, 0x9d) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:27:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b41, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:27:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) (fail_nth: 1) 09:27:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1679.830604] FAULT_INJECTION: forcing a failure. [ 1679.830604] name failslab, interval 1, probability 0, space 0, times 0 [ 1679.832523] CPU: 1 PID: 8683 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1679.833507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1679.834773] Call Trace: [ 1679.835169] dump_stack+0x107/0x167 [ 1679.835698] should_fail.cold+0x5/0xa [ 1679.836272] ? xas_alloc+0x336/0x440 [ 1679.836782] should_failslab+0x5/0x20 [ 1679.837347] kmem_cache_alloc+0x5b/0x360 [ 1679.837929] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1679.838667] xas_alloc+0x336/0x440 [ 1679.839062] xas_create+0x35f/0x1040 [ 1679.839574] xas_store+0x90/0x1c40 [ 1679.840013] ? xas_find_conflict+0x4a6/0x9f0 [ 1679.840600] __add_to_page_cache_locked+0x708/0xcf0 [ 1679.841227] ? file_write_and_wait_range+0x130/0x130 [ 1679.841902] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 1679.842481] ? find_get_entry+0x2d9/0x6e0 [ 1679.843031] ? mark_held_locks+0x9e/0xe0 [ 1679.843570] add_to_page_cache_lru+0xe6/0x2e0 [ 1679.844167] ? add_to_page_cache_locked+0x40/0x40 [ 1679.844871] ? __page_cache_alloc+0x10d/0x360 [ 1679.845509] pagecache_get_page+0x38b/0xc80 [ 1679.846116] grab_cache_page_write_begin+0x64/0xa0 [ 1679.846822] ext4_move_extents+0x1216/0x3270 [ 1679.847511] ? lock_acquire+0x197/0x490 [ 1679.848081] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1679.848830] ? lock_release+0x6b0/0x6b0 [ 1679.849407] ? __fget_files+0x296/0x480 [ 1679.850019] ? rcu_read_lock_any_held+0x75/0xa0 [ 1679.850688] __ext4_ioctl+0x304d/0x41c0 [ 1679.851301] ? __lock_acquire+0xbb1/0x5b00 [ 1679.851913] ? ext4_reset_inode_seed+0x450/0x450 [ 1679.852584] ? perf_trace_lock+0xac/0x490 [ 1679.853191] ? SOFTIRQ_verbose+0x10/0x10 [ 1679.853805] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1679.854703] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1679.855455] ? do_vfs_ioctl+0x283/0x10d0 [ 1679.856046] ? selinux_inode_getsecctx+0x90/0x90 [ 1679.856710] ? generic_block_fiemap+0x60/0x60 [ 1679.857400] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1679.858095] ? ext4_fc_start_update+0xa2/0x2e0 [ 1679.858765] ext4_ioctl+0x46/0x90 [ 1679.859299] ? __ext4_ioctl+0x41c0/0x41c0 [ 1679.859908] __x64_sys_ioctl+0x19a/0x210 [ 1679.860617] do_syscall_64+0x33/0x40 [ 1679.861196] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1679.861918] RIP: 0033:0x7fe0be643b19 [ 1679.862459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1679.864999] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1679.866125] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1679.867121] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1679.868120] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1679.869092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1679.870091] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 09:27:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00') mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:27:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000b40)='./file0/../file0\x00', 0x10000000) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mount$bind(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000ac0)='./file0/../file0\x00', &(0x7f0000000b00), 0x1000000, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) syz_mount_image$nfs4(&(0x7f0000000280), &(0x7f00000002c0)='./file0/../file0\x00', 0x5, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000400)="5ba05ad6629813cbeada303d317656745f3543883cd9ade1c3b3d176a9d2ffd601d73df07983adbea0cbf2dc9fec5dd211b7c2e914b4a26d7f1172d318d032cdd2e9b718919c7ed0eb8912013862754615805dd0dbd2a73cbe176c1bbb228e47cec551495acfbec692fd34c1c92124b95b64fdaac99d76ef216342b6044d9cada813b8a8c9db", 0x86, 0xc0f2}, {&(0x7f0000000b80)="e63848629ed39f22b109005c62176aad56372ca6280da9bdbc58906999ad4330ca7b3f2db83ffb4cf55350a73e77a8d214cb651898dde88bcc6070ad22627dc52fa6d6821f362225e38c8acfd5f72b243e7ead2d521994a9d8a8e42ed4700ae809f1d8bd16d002", 0x67, 0xffff}, {&(0x7f0000000380)="d7ee59efcc6c2f7d14f4a50cb976cad8f55edc75bdae3ee9c1a819d964bcba6084d1846ce4a30a2cc84f3c105197", 0x2e, 0x3}, {&(0x7f0000000540)="aa312f4499d88e87b56ae6f47681e6a7458a52f32494b48f24ea12f93fd7a981bd22eabc479c3cf725650acf08d3f4417613ff1d33461d073eaeb53d4750ab37d155a9837df51caa97a96b", 0x4b, 0xf7}, {&(0x7f00000005c0)="ea459054037f1ee23eb405011d189f4833f228017e8da2d59c0bec3d9b62560f78d1f9f310466a09aab3fb931d01a48ea551ae00b49a84721b44df290c384162359522147f0dcd6e750db7faef7af322af838218ee84a06cf381672489e81e081326548be5d713bd370f67a2c8981c3a2adfae999f32af221593ed4e659661e02833e89abdc254b8920bf479c0f70b6a982b0aba5f", 0x95, 0x7ff}, {&(0x7f0000000680)="2a1f9acbcde264a27196c081018e4aa997520caefe1715fb636af67e01f1c69de121bb6604901f2f4c87f3f07084538f075cddbc4ad9d9ce169ad44ed04a393b4ed54973297004ddb0d65664744e17d9ac13e81d204d4470240cb2a785efbf0e2e576440a9ed21407c6ad7c2", 0x6c, 0x2a4}, {&(0x7f0000000700)="30a36b7bb54f6cc8eb31cc41b6b2049bd4965ed5a36ff5a4562cfed4df635a0cf448a9df4fbf345863f9d44cca64681a1b6fbd12bae909307266070028c79256d6492ef128d172b4a4b8186912d0e7c4cef3d23d1a9c9520cd53c4cf0583f4098fdf634a9c8bf59fea2a36f0da4d91b799fb94c78dc2e9257a0bbe6f89e6f0402b265c", 0x83, 0x6}, {&(0x7f00000007c0)="af4a66e5215e0a07c075d9d4e8618fa805080726972e5312c4d31485b1a865cdc9cd7531928ba2e5d05b961bbd7f9fa1dae5c812daf7794e073be1e3bddcb4d1a3fb01e976c0a3b1c37577490c7e8822fdf6ee22d7e52a6562815bc249185944a1fb50f96fb84fe75043e213f22f21ee52c82ff2c85e580734f2ecbe6a6073add674f2091b356d439cab535ed129ebd6ed14ddf2aa2901df6666a997b06bb85649321afc6b99baa985f12ffbf606ad0d7c5242e70fffc487707f55665373fd23fcf246b91c96d6f42b6da52ed38fcc43014b5c3bd2655271c86f4906da308223633ca1fe760550f9e80efe971f", 0xed, 0x80}], 0x10410, &(0x7f0000000980)={[{'@%^'}, {'tmpfs\x00'}, {':&'}, {'\'$@(,+'}, {'tmpfs\x00'}, {}, {}, {'\'^$\\$'}], [{@hash}, {@smackfshat={'smackfshat', 0x3d, '$*@'}}, {@fsmagic={'fsmagic', 0x3d, 0xc01a}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x30, 0x66, 0x33, 0x33, 0x32, 0x30, 0x37], 0x2d, [0x31, 0x64, 0x34, 0x62], 0x2d, [0x55, 0x32, 0x66, 0x32], 0x2d, [0x65, 0x36, 0x31, 0x31], 0x2d, [0x34, 0x36, 0x63, 0x61, 0x39, 0x30, 0x62, 0x33]}}}, {@smackfsroot={'smackfsroot', 0x3d, 'tmpfs\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@subj_user={'subj_user', 0x3d, 'tmpfs\x00'}}]}) 09:27:51 executing program 6: r0 = clone3(&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/201, 0xc9}, {&(0x7f0000000640)=""/80, 0x50}, {&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000300)=""/220, 0xdc}, {&(0x7f0000000400)=""/45, 0x2d}, {&(0x7f0000000440)=""/77, 0x4d}, {&(0x7f00000004c0)=""/160, 0xa0}], 0x7, &(0x7f0000002e00)=[{&(0x7f0000001740)=""/135, 0x87}, {&(0x7f0000000000)=""/180, 0xb4}, {&(0x7f00000018c0)=""/206, 0xce}, {&(0x7f00000019c0)=""/215, 0xd7}, {&(0x7f0000001ac0)=""/216, 0xd8}, {&(0x7f0000001bc0)=""/78, 0x4e}, {&(0x7f0000000580)=""/40, 0x28}, {&(0x7f0000001c80)=""/134, 0x86}, {&(0x7f0000001d40)=""/155, 0x9b}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0xa, 0x0) clone3(&(0x7f00000000c0)={0x42182f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:27:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b44, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1680.012395] FAULT_INJECTION: forcing a failure. [ 1680.012395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1680.014430] CPU: 0 PID: 8691 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1680.015486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.016628] Call Trace: [ 1680.017021] dump_stack+0x107/0x167 [ 1680.017565] should_fail.cold+0x5/0xa [ 1680.018098] _copy_from_user+0x2e/0x1b0 [ 1680.018787] __copy_msghdr_from_user+0x91/0x4b0 [ 1680.019455] ? __ia32_sys_shutdown+0x80/0x80 [ 1680.020075] ? perf_trace_lock+0xac/0x490 [ 1680.020664] ? __lock_acquire+0xbb1/0x5b00 [ 1680.021259] sendmsg_copy_msghdr+0xa1/0x160 [ 1680.021851] ? do_recvmmsg+0x6d0/0x6d0 [ 1680.022403] ? perf_trace_lock+0xac/0x490 [ 1680.022978] ? SOFTIRQ_verbose+0x10/0x10 [ 1680.023562] ? __lockdep_reset_lock+0x180/0x180 [ 1680.024236] ? perf_trace_lock+0xac/0x490 [ 1680.024807] ? SOFTIRQ_verbose+0x10/0x10 [ 1680.025422] ___sys_sendmsg+0xc6/0x170 [ 1680.025981] ? sendmsg_copy_msghdr+0x160/0x160 [ 1680.026668] ? __fget_files+0x26d/0x480 [ 1680.027212] ? lock_downgrade+0x6d0/0x6d0 [ 1680.027788] ? find_held_lock+0x2c/0x110 [ 1680.028384] ? __fget_files+0x296/0x480 [ 1680.028962] ? __fget_light+0xea/0x290 [ 1680.029509] __sys_sendmsg+0xe5/0x1b0 [ 1680.030025] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1680.030653] ? rcu_read_lock_any_held+0x75/0xa0 [ 1680.031318] ? fput_many+0x2f/0x1a0 [ 1680.031824] ? ksys_write+0x1a9/0x260 [ 1680.032355] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.033091] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.033841] ? trace_hardirqs_on+0x5b/0x180 [ 1680.034484] do_syscall_64+0x33/0x40 [ 1680.035021] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1680.035728] RIP: 0033:0x7ffb0083db19 [ 1680.036228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.038851] RSP: 002b:00007ffafddb3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1680.039912] RAX: ffffffffffffffda RBX: 00007ffb00950f60 RCX: 00007ffb0083db19 [ 1680.040927] RDX: 0000000010044001 RSI: 00000000200006c0 RDI: 0000000000000003 [ 1680.041911] RBP: 00007ffafddb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.042942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1680.044002] R13: 00007fff1455c01f R14: 00007ffafddb3300 R15: 0000000000022000 [ 1680.045193] hpet: Lost 1 RTC interrupts 09:27:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) (fail_nth: 2) [ 1680.315624] FAULT_INJECTION: forcing a failure. [ 1680.315624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1680.317322] CPU: 0 PID: 8707 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1680.318240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1680.319390] Call Trace: [ 1680.319771] dump_stack+0x107/0x167 [ 1680.320264] should_fail.cold+0x5/0xa [ 1680.320781] _copy_from_user+0x2e/0x1b0 [ 1680.321324] iovec_from_user+0x141/0x400 [ 1680.321875] __import_iovec+0x67/0x590 [ 1680.322444] ? __ia32_sys_shutdown+0x80/0x80 [ 1680.323029] ? perf_trace_lock+0xac/0x490 [ 1680.323588] import_iovec+0x83/0xb0 [ 1680.324100] sendmsg_copy_msghdr+0x131/0x160 [ 1680.324682] ? do_recvmmsg+0x6d0/0x6d0 [ 1680.325212] ? perf_trace_lock+0xac/0x490 [ 1680.325774] ? __lockdep_reset_lock+0x180/0x180 [ 1680.326409] ? perf_trace_lock+0xac/0x490 [ 1680.326957] ? SOFTIRQ_verbose+0x10/0x10 [ 1680.327491] ___sys_sendmsg+0xc6/0x170 [ 1680.328018] ? sendmsg_copy_msghdr+0x160/0x160 [ 1680.328635] ? __fget_files+0x26d/0x480 [ 1680.329227] ? lock_downgrade+0x6d0/0x6d0 [ 1680.329781] ? find_held_lock+0x2c/0x110 [ 1680.330391] ? __fget_files+0x296/0x480 [ 1680.330931] ? __fget_light+0xea/0x290 [ 1680.331446] __sys_sendmsg+0xe5/0x1b0 [ 1680.331944] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1680.332510] ? rcu_read_lock_any_held+0x75/0xa0 [ 1680.333122] ? fput_many+0x2f/0x1a0 [ 1680.333594] ? ksys_write+0x1a9/0x260 [ 1680.334109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1680.334830] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1680.335516] ? trace_hardirqs_on+0x5b/0x180 [ 1680.336096] do_syscall_64+0x33/0x40 [ 1680.336596] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1680.337279] RIP: 0033:0x7ffb0083db19 [ 1680.337773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1680.340547] RSP: 002b:00007ffafddb3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1680.341673] RAX: ffffffffffffffda RBX: 00007ffb00950f60 RCX: 00007ffb0083db19 [ 1680.342745] RDX: 0000000010044001 RSI: 00000000200006c0 RDI: 0000000000000003 [ 1680.343951] RBP: 00007ffafddb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.344929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1680.346046] R13: 00007fff1455c01f R14: 00007ffafddb3300 R15: 0000000000022000 [ 1680.347243] hpet: Lost 1 RTC interrupts [ 1680.349486] nfs4: Unknown parameter '@%^' [ 1680.435630] nfs4: Unknown parameter '@%^' 09:28:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b45, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:28:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:28:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000100)='./cgroup.cpu/cgroup.procs\x00', 0xc0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) 09:28:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) (fail_nth: 3) 09:28:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:28:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00') syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 8) [ 1695.169762] FAULT_INJECTION: forcing a failure. [ 1695.169762] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.171838] CPU: 1 PID: 8734 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1695.172835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1695.174210] Call Trace: [ 1695.174623] dump_stack+0x107/0x167 [ 1695.175147] should_fail.cold+0x5/0xa [ 1695.175639] ? __alloc_skb+0x6d/0x620 [ 1695.176142] should_failslab+0x5/0x20 [ 1695.176650] kmem_cache_alloc_node+0x55/0x370 [ 1695.177293] ? __lock_acquire+0x1657/0x5b00 [ 1695.177944] __alloc_skb+0x6d/0x620 [ 1695.178478] sk_stream_alloc_skb+0x109/0xc30 [ 1695.179149] tcp_sendmsg_locked+0xc3a/0x2f20 [ 1695.179786] ? lock_downgrade+0x6d0/0x6d0 [ 1695.180379] ? tcp_sendpage+0xd0/0xd0 [ 1695.180920] ? mark_held_locks+0x9e/0xe0 [ 1695.181443] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1695.182125] ? __local_bh_enable_ip+0x9d/0x100 [ 1695.182782] ? tcp_sendmsg_locked+0x2f20/0x2f20 [ 1695.183454] tcp_sendmsg+0x2b/0x50 [ 1695.183957] inet6_sendmsg+0xb5/0x140 [ 1695.184485] ? inet6_compat_ioctl+0x320/0x320 [ 1695.185166] sock_sendmsg+0xf2/0x190 [ 1695.185708] ____sys_sendmsg+0x70d/0x870 [ 1695.186284] ? kernel_sendmsg+0x50/0x50 [ 1695.186820] ? do_recvmmsg+0x6d0/0x6d0 [ 1695.187340] ? perf_trace_lock+0xac/0x490 09:28:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1695.187935] ? __lockdep_reset_lock+0x180/0x180 [ 1695.188787] ? perf_trace_lock+0xac/0x490 [ 1695.189426] ? SOFTIRQ_verbose+0x10/0x10 [ 1695.190038] ___sys_sendmsg+0xf3/0x170 [ 1695.190618] ? sendmsg_copy_msghdr+0x160/0x160 [ 1695.191258] ? lock_downgrade+0x6d0/0x6d0 [ 1695.191808] ? find_held_lock+0x2c/0x110 [ 1695.192374] ? __fget_files+0x296/0x480 [ 1695.193090] ? __fget_light+0xea/0x290 [ 1695.193686] __sys_sendmsg+0xe5/0x1b0 [ 1695.194267] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1695.195054] ? rcu_read_lock_any_held+0x75/0xa0 [ 1695.195832] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1695.196546] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1695.197246] ? trace_hardirqs_on+0x5b/0x180 [ 1695.197931] do_syscall_64+0x33/0x40 [ 1695.198587] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1695.199441] RIP: 0033:0x7ffb0083db19 [ 1695.200065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.202851] RSP: 002b:00007ffafddb3188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1695.204112] RAX: ffffffffffffffda RBX: 00007ffb00950f60 RCX: 00007ffb0083db19 [ 1695.205259] RDX: 0000000010044001 RSI: 00000000200006c0 RDI: 0000000000000003 [ 1695.206316] RBP: 00007ffafddb31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1695.207428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1695.208539] R13: 00007fff1455c01f R14: 00007ffafddb3300 R15: 0000000000022000 09:28:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b46, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:28:06 executing program 6: unshare(0x2a040600) unshare(0x60020000) unshare(0x10000) r0 = openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) close(r1) unshare(0x18000200) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000040)) [ 1695.325909] FAULT_INJECTION: forcing a failure. [ 1695.325909] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.327486] CPU: 1 PID: 8742 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1695.328373] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1695.329673] Call Trace: [ 1695.330087] dump_stack+0x107/0x167 [ 1695.330625] should_fail.cold+0x5/0xa [ 1695.331146] ? create_object.isra.0+0x3a/0xa20 [ 1695.331753] should_failslab+0x5/0x20 [ 1695.332248] kmem_cache_alloc+0x5b/0x360 [ 1695.332759] create_object.isra.0+0x3a/0xa20 [ 1695.333519] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1695.334239] kmem_cache_alloc+0x159/0x360 [ 1695.334811] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1695.335512] xas_alloc+0x336/0x440 [ 1695.335981] xas_create+0x35f/0x1040 09:28:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) setxattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)=@known='com.apple.system.Security\x00', &(0x7f0000000400)='tmpfs\x00', 0x6, 0x0) [ 1695.336561] xas_store+0x90/0x1c40 [ 1695.337308] ? xas_find_conflict+0x4a6/0x9f0 [ 1695.337904] __add_to_page_cache_locked+0x708/0xcf0 [ 1695.338593] ? file_write_and_wait_range+0x130/0x130 [ 1695.339263] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 1695.339946] ? find_get_entry+0x2d9/0x6e0 [ 1695.340491] ? mark_held_locks+0x9e/0xe0 [ 1695.341036] add_to_page_cache_lru+0xe6/0x2e0 [ 1695.341619] ? add_to_page_cache_locked+0x40/0x40 [ 1695.342261] ? __page_cache_alloc+0x10d/0x360 [ 1695.342875] pagecache_get_page+0x38b/0xc80 [ 1695.343455] grab_cache_page_write_begin+0x64/0xa0 [ 1695.344110] ext4_move_extents+0x1216/0x3270 [ 1695.344734] ? lock_acquire+0x197/0x490 [ 1695.345389] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1695.346103] ? lock_release+0x6b0/0x6b0 [ 1695.346685] ? __fget_files+0x296/0x480 [ 1695.347220] ? rcu_read_lock_any_held+0x75/0xa0 [ 1695.347832] __ext4_ioctl+0x304d/0x41c0 [ 1695.348339] ? __lock_acquire+0xbb1/0x5b00 [ 1695.348870] ? ext4_reset_inode_seed+0x450/0x450 [ 1695.349461] ? perf_trace_lock+0xac/0x490 [ 1695.349969] ? SOFTIRQ_verbose+0x10/0x10 [ 1695.350498] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1695.351231] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1695.351870] ? do_vfs_ioctl+0x283/0x10d0 [ 1695.352387] ? selinux_inode_getsecctx+0x90/0x90 [ 1695.352991] ? generic_block_fiemap+0x60/0x60 [ 1695.353589] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1695.354245] ? ext4_fc_start_update+0xa2/0x2e0 [ 1695.354890] ext4_ioctl+0x46/0x90 [ 1695.355337] ? __ext4_ioctl+0x41c0/0x41c0 [ 1695.355871] __x64_sys_ioctl+0x19a/0x210 [ 1695.356437] do_syscall_64+0x33/0x40 [ 1695.356931] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1695.357600] RIP: 0033:0x7fe0be643b19 [ 1695.358094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1695.360654] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1695.361720] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1695.362682] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1695.363629] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 09:28:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1695.364587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1695.365823] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 09:28:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b47, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:28:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:28:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b48, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:28:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) [ 1709.991107] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:28:31 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) openat(r0, &(0x7f00000002c0)='./file0/../file0\x00', 0x84000, 0xc0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:28:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:28:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:28:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b49, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:28:31 executing program 4: sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)={0x58, 0x0, 0x10, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x5d}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4000804) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 9) 09:28:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x10000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a090000000000000000", 0x80, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f00"/64, 0x40, 0x4e0}, {&(0x7f00000100c0)="0100000000000000000000000000000000000000040100001200000000000000", 0x20, 0x560}, {&(0x7f00000100e0)="0000000000000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b00000000", 0x60, 0x7e0}, {&(0x7f0000010160)="ffff05000c000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b000000dc030a026c6f73742b666f756e6400"/1088, 0x440, 0xc00}, {&(0x7f00000105a0)="0000000000000000000000000000000000000000000000000c0000de46b807b70b0000000c0001022e00000002000000e80302022e2e00"/64, 0x40, 0x13e0}, {&(0x7f00000105e0)="0000000000000000000000000000000000000000000000000c0000de5551aadd00000000f40300"/64, 0x40, 0x17e0}, {&(0x7f0000010620)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x1be0}, {&(0x7f0000010660)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x1fe0}, {&(0x7f00000106a0)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x23e0}, {&(0x7f00000106e0)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x27e0}, {&(0x7f0000010720)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x2be0}, {&(0x7f0000010760)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x2fe0}, {&(0x7f00000107a0)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x33e0}, {&(0x7f00000107e0)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x37e0}, {&(0x7f0000010820)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x3be0}, {&(0x7f0000010860)="0000000000000000000000000000000000000000000000000c0000de2b607f2900000000f40300"/64, 0x40, 0x3fe0}, {&(0x7f00000108a0)="0000000000000000000000000000000000000000000000000c0000de2b607f29", 0x20, 0x43e0}, {&(0x7f00000108c0)="ff07ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x400, 0x4c00}, {&(0x7f0000010cc0)="00000000000000009f09c75f9f09c75f9f09c75f00"/32, 0x20, 0x8c00}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c1f0000", 0xa0, 0x8c60}, {&(0x7f0000010d80)="00000000000000000000000000000000000000000000000000000000acff0000", 0x20, 0x8d60}, {&(0x7f0000010da0)="000000000000000000000000000000000000000000000000000000000ee30000", 0x20, 0x7fff}, {&(0x7f0000010dc0)="0000000000000000000000000000000000ca00000000000000000000ce1e0000", 0x20, 0x8e60}, {&(0x7f0000010de0)="000000000000000000000000000000000000000000000000000000007f6e000080810000003004049f09c75f9f09c75f9f09c75f000000000000010002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000110000000000000000000000000000000000000000000000000000000000000005620000", 0xa0, 0x8ee0}, {&(0x7f0000010e80)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00;W\x00\x00', 0x20, 0x8fe0}, {&(0x7f0000010ea0)="00000000000000000000000000000000000000000000000000000000fbaa0000", 0x20, 0x9060}, {&(0x7f0000010ec0)="000000000000000000000000000000000000000000000000000000004ada0000c0410000003000009f09c75f9f09c75f9f09c75f00000000000002001800000000000800000000000af301000400000000000000000000000c0000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070fa0000", 0xa0, 0x90e0}], 0x0, &(0x7f0000010f60)) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='mnt', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000140)={@id={0x2, 0x0, @a}, 0x40, 0x0, '\x00', @a}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x1c0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000500)='mnt/encrypted_dir\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000540)=@v2={0x2, @aes256, 0x0, '\x00', @a}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000580)='mnt/encrypted_dir/file\x00', 0x42, 0x180) write(r2, &(0x7f00000005c0)='foo', 0x3) 09:28:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b4a, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:28:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:28:31 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000380)='./file0/../file0\x00', 0xd6c9, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000400)="d96cba7655b44cb2f9c7c75197baa7e7198f4dfbe5d40704820090ee5ec89d9c11cf02937e6cf5214e2ea24913", 0x2d}, {&(0x7f0000000440)="3f2b428296af2f8053e9079ea808a97883d80ffa4131c4ee459cada51a68bf2b1d7d10f71335542756a511df8dbdd6d88d4391e294574b85295713c6acbb5a7d0499ce90774196ab056410016fd75a2884c6e21599f4d480e441d1938b0614651bca82d16fdfcadc7d57b439da", 0x6d, 0x371}, {&(0x7f00000004c0)="d44bd8b46516a41a62856f909015e34a329a86ccf728c47aa02995d942ec9ddba31fb2f17a07af3a9500713ede55dd17370cb94c57daed15b7302bd505456b44ae6a503daf2ab85232870adcb114f410b26d91dd74f90ed86154a7a3f239db9520ff02cb764dd5c3bef1c34b19a6658b1a80a2b89205764d4c65f53080831ab56d82964d43d8d4c13c0c0797", 0x8c, 0x5}, {&(0x7f0000000580)="c10219b35da8a4c412f324941d970e608203aaf088c7ea7166a9f5f9c367b1668bf5bca716e9de8330a7570b5354c3b2223059542ebbae72a8092ce8f0b178000c0f5d09f0a49c95f10efac0ebacf35b6cf25393b40ca63ff29c265ceba8015ca40fe1495ac9f55cb30906a5d3a12c954b0a288f16c1f218da85bdb4d61df0401531cf8b2bc24c93e098870d821a949f9d93276a86baa3ec9a2a41af1bec55c2df8305cab654299ac7cf27e7875f28a93f44e45f617a8c21ad79c07caacff1a645425dbc60e01007ed733cd7c65f01ac59e3cc0170c671", 0xd7, 0x2}, {&(0x7f0000000680)="a3034596ea411657cdc9c3dace5c6a17d42a9829fe80", 0x16, 0x1}, {&(0x7f00000006c0)="6c5a7fed9ed152ca0fd4815d6299523c8a9d4307b93e3e1b8ebea816188e2901b407b8027f8d5b706467dd7c37246070bc4b5b21584da4840aa3fbbde687b2a8e8f9b21d614f34ff5ce7ad27a494f638ce320488ceeef2430b762fd0df1787bd2a413e95faf914fbfc0b38e5b53a33ceeb4a3145ae01bf78a07478460653c63e5acd29463d74d8c7fe68a30584fb6fdd0839007503", 0x95, 0x1}, {&(0x7f0000000780)="1b2457d91db9887ea4a10c6b82930b808602331e152f002d26556a8a1a2fd11fac6c36aff1c405b6dde21a5e7429c6a92c3721794d50f5a8a60c5be7771fe64fa0970257870a60e5cea382a846a1995b4a6605243e356dc8947e4c46", 0x5c, 0x56d}, {&(0x7f0000000800)="76d0208272171338dc12a95a4491d91ac4cf2a4dfc0a1c415b8c3a14ad474d3d0bd5e42e384df3f01350b90ac80597d406bbcdf5db31332359a1c851cbc5fbd7cbfdd9eb531bd25709f1ed660bcd5d557c486aa42809c098f4b5be98262d84af04db4ad008a6a1b31af3e3d33c1cdac24f9e18fda30584c4f6aa4c5f302d9152fb97d0a4be668e8a53fb77aeabd192ae90dc69", 0x93, 0x8001}], 0x123480c, &(0x7f0000000980)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4}}, {@nolazytime}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x200}}, {@min_batch_time={'min_batch_time', 0x3d, 0x716e47d7}}, {@grpquota}], [{@appraise}, {@appraise}]}) [ 1720.844485] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1720.859611] ext4 filesystem being mounted at /syzkaller-testdir910841981/syzkaller.eql6nZ/83/mnt supports timestamps until 2038 (0x7fffffff) [ 1720.880604] FAULT_INJECTION: forcing a failure. [ 1720.880604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1720.883061] CPU: 1 PID: 8798 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1720.884210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.885623] Call Trace: [ 1720.886090] dump_stack+0x107/0x167 [ 1720.886724] should_fail.cold+0x5/0xa [ 1720.887397] __alloc_pages_nodemask+0x182/0x680 [ 1720.888192] ? xas_start+0x156/0x530 [ 1720.888838] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1720.889864] ? xas_load+0x66/0x2c0 [ 1720.890485] ? find_get_entry+0x2d9/0x6e0 [ 1720.891217] ? lru_cache_add+0x45c/0x800 [ 1720.891916] alloc_pages_current+0x187/0x280 [ 1720.892828] __page_cache_alloc+0x2d2/0x360 [ 1720.893585] pagecache_get_page+0x2c7/0xc80 [ 1720.894342] grab_cache_page_write_begin+0x64/0xa0 [ 1720.895190] ext4_move_extents+0x1237/0x3270 [ 1720.896007] ? lock_acquire+0x197/0x490 [ 1720.896785] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1720.897825] ? lock_release+0x6b0/0x6b0 [ 1720.898503] ? __fget_files+0x296/0x480 [ 1720.899221] ? rcu_read_lock_any_held+0x75/0xa0 [ 1720.900020] __ext4_ioctl+0x304d/0x41c0 [ 1720.900713] ? __lock_acquire+0xbb1/0x5b00 [ 1720.901445] ? ext4_reset_inode_seed+0x450/0x450 [ 1720.902240] ? perf_trace_lock+0xac/0x490 [ 1720.902969] ? SOFTIRQ_verbose+0x10/0x10 [ 1720.903688] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1720.904665] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1720.905520] ? do_vfs_ioctl+0x283/0x10d0 [ 1720.906198] ? selinux_inode_getsecctx+0x90/0x90 [ 1720.907012] ? generic_block_fiemap+0x60/0x60 [ 1720.907873] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1720.908718] ? ext4_fc_start_update+0xa2/0x2e0 [ 1720.909478] ext4_ioctl+0x46/0x90 [ 1720.910050] ? __ext4_ioctl+0x41c0/0x41c0 [ 1720.910754] __x64_sys_ioctl+0x19a/0x210 [ 1720.911486] do_syscall_64+0x33/0x40 [ 1720.912132] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1720.912997] RIP: 0033:0x7fe0be643b19 [ 1720.913613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.916631] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1720.917912] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1720.919086] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1720.920220] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.921408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1720.922590] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 09:28:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) r1 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x20) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) recvmsg$unix(r1, &(0x7f0000001c00)={&(0x7f0000000a40), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000001b00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd8}, 0x10041) statx(r0, &(0x7f0000001c40)='./file0/file0\x00', 0x0, 0x8, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000380)='./file0/../file0\x00', 0x6, 0x9, &(0x7f0000000940)=[{&(0x7f0000000400)="ee889b8358570350d72dd9c6e5ea8fea771034a5804e735d021b003fcd2432942cbbe3ea294b1fb51228b53c4577af04a6edbda15e54b36b8d832e829b02250196ce06a19bc775b6e37940d052e9dfb61be430c47be2d98c21594e5a50b80dfb92a5b9b2f709e9a571d6f0c01f49538cd02f4637697f6b2faa6d9804716bfd6bcca179a5dbaa0089cd9fe5c93d2f28", 0x8f, 0x4}, {&(0x7f00000004c0)="9d17417d4128878c43622da38ee46ffcf0565f9b732a128b366ed0a8f830a3930a0a3c44a84de9a1e37b5042b20fb474d2c85543d9d3c79b153a4a6bbe3d64e0f3b23e8d8e2d6e46e6e7e89aa11b41e536690c5891893c1fe20de957edc7f2d9034e89bc9fa3ca0a83be1f7a4c7af46a5b0a3f81e8a8e26dd2f6de9cdee905aad55a8c24671a37c6a7a1e136d1ce2a374cd434a817b185390370405d1864e26cec1ac07d75af167e45e2f429fa337de1965c0ff6373eb3c49d3a9ef62a6b5f32820cb9b532bdb90e8d601e7d6333db", 0xcf, 0x5d8c0a47}, {&(0x7f00000005c0)="5c596bc830aea60c0ab4335a718bd12ca8e3d4bea84bbfa90b0e9aea1e0615d514b1cf4d16e593097ba55dfc99408d468b7f898fc26ff2e782f05a443f432676d131e87f9fb9bb4941b8ebc0992334eb73850983eeaf7346e5efaf2c5cd00362def59c5af68c94dbf3517a6fb537a6b57341fb52b4707e9bb0c5325527c200ed8a1ac7054adb3f95559a6efabc4e9ff7442964d328ad04c342", 0x99, 0x1}, {&(0x7f0000000680)="a32b1eb31f893eb6546eba5bdb", 0xd, 0x5}, {&(0x7f00000006c0)="ac7b056ee636b43d07fa05", 0xb, 0xff}, {&(0x7f0000000700)="5e0c2f7ac8763c921aa3e5be17f5abf8b08591489a20b20a1a92ba84fb9c4ce60577e65cce39538bc3397983c363825a3a927c17a849f904715322e3814ffb14ab3a2d2a2876733555404394144f63b834bff078d221907819658432135cb74d2c399036ed4308aba31a536b148b9c7783bb76afe579f7a82bbb4405719cfc1340d04baafd4d3fb91b8be3e089885e2d2032780a09edaf041ab9bc730359df1db37df42198593ccf04579b7704f716627bd91ab89fde7d0ed37ff8c8215287bf18f1eebae26a252e9019fe37013b329f31c9c48086f2bc6f9f3c59086732b74108ea713d9aa9dda650563ad227f25193fa2e4282f6", 0xf5, 0x100000000}, {&(0x7f0000000800)="2d43fb75632383eee2eed17ede0d65b2f6ee4eef956c9aab8326ea076bd7971a4335b44f295c531ddfd184670dafef56a68c68ed1fc9c9a0303128a2227f2d98be0f7ea1adb3de50eada3a42214c1bcd2330bcc2ebb3632be6b3926da42600006a2435aa6f07f6170384a114980213a9b8c644647843fa8a7ea6a1cd86b29d9798562db5792fbe72da15258eee1fa3832b36029ed48f8806e79c128654138e", 0x9f, 0x117}, {&(0x7f00000008c0)="58e7ee7865bfc302ea2b4e681228ad2e5080d3a5b15d98019107", 0x1a, 0x8}, {&(0x7f0000000900)="8e5c0ebb3814390ab0", 0x9, 0x1f}], 0x40000, &(0x7f0000001d80)={[{@uid={'uid', 0x3d, r2}}, {@nr_inodes={'nr_inodes', 0x3d, [0x78, 0x76, 0x74, 0x36]}}, {@size={'size', 0x3d, [0x37, 0x39, 0x74, 0x37]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x39, 0x65, 0x30]}}], [{@audit}, {@seclabel}, {@obj_user={'obj_user', 0x3d, 'tmpfs\x00'}}, {@seclabel}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'tmpfs\x00'}}, {@dont_measure}, {@uid_gt={'uid>', r3}}, {@subj_user={'subj_user', 0x3d, '(^)!@'}}]}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:32 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b4b, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:28:32 executing program 6: write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) r1 = eventfd(0x0) r2 = dup2(r1, r0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000280)) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0'}, 0xb) 09:28:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:28:32 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:28:32 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0/../file0\x00', 0x6) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) pivot_root(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0/../file0\x00'}) write$P9_RREADDIR(r1, &(0x7f0000000440)={0x15b, 0x29, 0x2, {0x1, [{{0x1, 0x2, 0x3}, 0x7, 0x0, 0xd, './file0/file0'}, {{0x80, 0x3, 0x5}, 0x7, 0x4, 0x10, './file0/../file0'}, {{0x40, 0x3, 0x1}, 0x9, 0x4, 0x10, './file0/../file0'}, {{0x8}, 0xf1f9, 0x81, 0x10, './file0/../file0'}, {{0x0, 0x3, 0x8}, 0x5, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x10040000, 0x8, 0x7, './file1'}, {{0x80, 0x1, 0x8}, 0x3, 0x4, 0x10, './file0/../file0'}, {{0x40, 0x3, 0x5}, 0x845, 0x0, 0xd, './file0/file0'}, {{0x40, 0x2, 0x4}, 0xfffffffffffffffa, 0x7, 0x10, './file0/../file0'}]}}, 0x15b) chmod(&(0x7f0000000600)='./file1\x00', 0x81) 09:28:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f00000002c0)=ANY=[]) mkdir(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1735.434489] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:28:55 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:28:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b4c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:28:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003000)=[{{&(0x7f00000004c0)=@abs, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000540)=""/111, 0x6f}, {&(0x7f00000005c0)=""/138, 0x8a}, {&(0x7f0000000680)=""/163, 0xa3}], 0x3, &(0x7f0000000780)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000000800)=@abs, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000880)=""/185, 0xb9}, {&(0x7f0000000940)=""/107, 0x6b}, {&(0x7f00000009c0)=""/101, 0x65}, {&(0x7f0000000a40)=""/11, 0xb}, {&(0x7f0000000a80)=""/120, 0x78}], 0x5, &(0x7f0000000b80)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}, {{&(0x7f0000000cc0), 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/209, 0xd1}, {&(0x7f0000001e40)=""/137, 0x89}, {&(0x7f0000001f00)=""/131, 0x83}], 0x4}}, {{&(0x7f0000002000), 0x6e, &(0x7f0000002780)=[{&(0x7f0000002080)=""/226, 0xe2}, {&(0x7f0000002180)=""/234, 0xea}, {&(0x7f0000002280)=""/225, 0xe1}, {&(0x7f0000002380)=""/74, 0x4a}, {&(0x7f0000002400)=""/250, 0xfa}, {&(0x7f0000002500)=""/88, 0x58}, {&(0x7f0000002580)=""/244, 0xf4}, {&(0x7f0000002680)=""/251, 0xfb}], 0x8, &(0x7f0000002800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000002840), 0x6e, &(0x7f0000002a40)=[{&(0x7f00000028c0)=""/122, 0x7a}, {&(0x7f0000002940)=""/123, 0x7b}, {&(0x7f00000029c0)=""/113, 0x71}], 0x3}}, {{&(0x7f0000002a80), 0x6e, &(0x7f0000002e40)=[{&(0x7f0000002b00)=""/15, 0xf}, {&(0x7f0000002b40)=""/161, 0xa1}, {&(0x7f0000002c00)=""/158, 0x9e}, {&(0x7f0000002cc0)=""/61, 0x3d}, {&(0x7f0000002d00)=""/45, 0x2d}, {&(0x7f0000002d40)=""/251, 0xfb}], 0x6, &(0x7f0000002ec0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x138}}], 0x6, 0x40, &(0x7f0000003180)={0x0, 0x3938700}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$AUDIT_MAKE_EQUIV(r3, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000040)={r3, 0x2}) close_range(r4, r4, 0x2) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(r4, 0x400454ce, r5) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f00000031c0)={{}, {}, [{0x2, 0x2, r0}, {0x2, 0x2, 0xffffffffffffffff}, {0x2, 0x9, r1}, {0x2, 0x4, r2}], {}, [{0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x4}, {0x8, 0x0, 0xee00}, {0x8, 0x4, 0xee00}, {0x8, 0x1, r5}, {0x8, 0x3, 0xee01}], {0x10, 0x5}, {0x20, 0x1}}, 0x74, 0x1) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:28:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 10) 09:28:55 executing program 6: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x14, 0x5e, 0x2, 0x70bd2b, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)={0x30, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_SCAN_FREQUENCIES={0x14, 0x2c, 0x0, 0x1, [{0x8}, {0x8, 0x0, 0x7}]}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1080100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x7, 0x79}}}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xd}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3a}]}, 0x48}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x30, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x6a}}}}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}]}, 0x30}}, 0x0) 09:28:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:28:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) getdents64(r0, &(0x7f0000000400)=""/210, 0xd2) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1744.070433] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8848 comm=syz-executor.6 09:28:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b4d, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1744.111727] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8852 comm=syz-executor.6 [ 1744.127390] FAULT_INJECTION: forcing a failure. [ 1744.127390] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.129168] CPU: 0 PID: 8855 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1744.130094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1744.131255] Call Trace: [ 1744.131611] dump_stack+0x107/0x167 [ 1744.132110] should_fail.cold+0x5/0xa [ 1744.132637] ? xas_alloc+0x336/0x440 [ 1744.133160] should_failslab+0x5/0x20 [ 1744.133687] kmem_cache_alloc+0x5b/0x360 [ 1744.134274] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1744.135056] xas_alloc+0x336/0x440 [ 1744.135569] xas_create+0x35f/0x1040 [ 1744.136103] xas_store+0x90/0x1c40 [ 1744.136591] ? xas_find_conflict+0x4a6/0x9f0 [ 1744.137190] __add_to_page_cache_locked+0x708/0xcf0 [ 1744.137890] ? file_write_and_wait_range+0x130/0x130 [ 1744.138607] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 1744.139370] ? find_get_entry+0x2d9/0x6e0 [ 1744.139972] ? lru_cache_add+0x45c/0x800 [ 1744.140541] add_to_page_cache_lru+0xe6/0x2e0 [ 1744.141168] ? add_to_page_cache_locked+0x40/0x40 [ 1744.141821] ? __page_cache_alloc+0x10d/0x360 [ 1744.142501] pagecache_get_page+0x38b/0xc80 [ 1744.143106] grab_cache_page_write_begin+0x64/0xa0 [ 1744.143807] ext4_move_extents+0x1237/0x3270 [ 1744.144566] ? lock_acquire+0x197/0x490 [ 1744.145140] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1744.145870] ? lock_release+0x6b0/0x6b0 [ 1744.146435] ? __fget_files+0x296/0x480 [ 1744.146986] ? rcu_read_lock_any_held+0x75/0xa0 [ 1744.147663] __ext4_ioctl+0x304d/0x41c0 [ 1744.148220] ? __lock_acquire+0xbb1/0x5b00 [ 1744.148841] ? ext4_reset_inode_seed+0x450/0x450 [ 1744.149510] ? perf_trace_lock+0xac/0x490 [ 1744.150073] ? SOFTIRQ_verbose+0x10/0x10 [ 1744.150669] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1744.151526] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1744.152229] ? do_vfs_ioctl+0x283/0x10d0 [ 1744.152791] ? selinux_inode_getsecctx+0x90/0x90 [ 1744.153441] ? generic_block_fiemap+0x60/0x60 [ 1744.154090] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1744.154784] ? ext4_fc_start_update+0xa2/0x2e0 [ 1744.155447] ext4_ioctl+0x46/0x90 [ 1744.155981] ? __ext4_ioctl+0x41c0/0x41c0 [ 1744.156558] __x64_sys_ioctl+0x19a/0x210 [ 1744.157123] do_syscall_64+0x33/0x40 [ 1744.157641] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1744.158375] RIP: 0033:0x7fe0be643b19 [ 1744.158885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1744.161454] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1744.162501] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1744.163486] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1744.164430] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1744.165405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1744.166368] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1744.167559] hpet: Lost 1 RTC interrupts 09:28:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:28:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x2038004, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380), 0x810000, &(0x7f0000000400)={[{}, {}, {@clone_children}], [{@fsname}, {@appraise_type}, {@measure}]}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) openat(r0, &(0x7f0000000280)='./file0/file0\x00', 0x2c00, 0x5) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:28:55 executing program 6: unshare(0x2a040600) r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002580)) unshare(0x50000000) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:28:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b4e, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1744.488135] cgroup: Unknown subsys name 'fsname' 09:28:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:28:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xffffffffffffff2d, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x4000000, 0x2, 0x3, 0x366}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r1, 0x76d3, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup2(r3, r2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r6 = dup2(r5, r4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r6, 0x0, &(0x7f0000000240)=""/61, 0x3d}, 0x9) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000400000000003dda8d5c787e6876a95223d985f0e382e72428100d6d5997ad50b6087bc9137ea00ac7d99c0157005b43e30a7a8be8b4d8adc234b69d6acfd40773fd5387d42dab52b4a9aa629e9f9b4ffbfa6a345950d6db1d98077d515d01c6d66c4166695cceb0a41465afea19055d2fecef4223ae1a11670452c2d252598c826c78cfd710276a35c15553fb77b57627399bd8c23f4a7ee7e6d721b01b18d8d036629c96a7d110b3858021acf34077ff181bbacc2f3897594cb3e097ba28ac991562ffdcd5942faf85940bd9754bf19c03e937bd646c2cbc23cb4622496b58c9354d29fd4ac61ea180"], 0x20000148) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wlan0\x00'}) read(r1, &(0x7f0000000140)=""/205, 0xcd) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfec4) pwritev2(r7, &(0x7f00000003c0)=[{&(0x7f0000000340)='t', 0x1}], 0x1, 0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 1759.104562] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:29:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:29:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$tmpfs(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000003c0), 0xc000, &(0x7f0000000400)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x36, 0x52, 0x37]}}, {@uid={'uid', 0x3d, 0xee00}}, {@huge_advise}], [{@subj_type={'subj_type', 0x3d, 'tmpfs\x00'}}]}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:29:18 executing program 6: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000a00)=@IORING_OP_OPENAT2={0x1c, 0x2, 0x0, 0xffffffffffffff9c, &(0x7f00000000c0)={0x80282, 0x1, 0x2}, &(0x7f0000000100)='./file0\x00', 0x18, 0x0, 0x12345}, 0x6) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f00000001c0)={0x0, 0x7f, 0x81}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000005c0)={0x0, 0xd6ee, 0xfffffffffffffffd}) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_dev$tty1(0xc, 0x4, 0x1) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)}, {&(0x7f0000000000)="a1", 0x1}], 0x2) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00'}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$cgroup_type(r1, &(0x7f0000000080), 0x9) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000009c0)={{0x1, 0x1, 0x18}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00'}) 09:29:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x2, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:29:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380), 0x80000, &(0x7f0000000400)={'trans=unix,', {[{@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@version_L}, {@uname={'uname', 0x3d, '&\\)\\-@'}}, {@aname={'aname', 0x3d, 'tmpfs\x00'}}, {@afid={'afid', 0x3d, 0x4}}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}], [{@subj_role={'subj_role', 0x3d, '\\/^!'}}, {@obj_type={'obj_type', 0x3d, 'tmpfs\x00'}}]}}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mount$bind(&(0x7f00000004c0)='./file0/../file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x1300439, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:29:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b52, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:29:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:29:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 11) [ 1767.653872] tmpfs: Bad value for 'nr_blocks' [ 1767.667054] tmpfs: Bad value for 'nr_blocks' 09:29:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b62, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:29:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1767.774624] FAULT_INJECTION: forcing a failure. [ 1767.774624] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.776291] CPU: 0 PID: 8912 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1767.777197] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1767.778259] Call Trace: [ 1767.778608] dump_stack+0x107/0x167 [ 1767.779076] should_fail.cold+0x5/0xa [ 1767.779641] ? create_object.isra.0+0x3a/0xa20 [ 1767.780295] should_failslab+0x5/0x20 [ 1767.780840] kmem_cache_alloc+0x5b/0x360 [ 1767.781418] create_object.isra.0+0x3a/0xa20 [ 1767.782009] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1767.782905] kmem_cache_alloc+0x159/0x360 [ 1767.782960] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1767.782983] xas_alloc+0x336/0x440 [ 1767.782999] xas_create+0x35f/0x1040 [ 1767.783031] xas_store+0x90/0x1c40 [ 1767.783061] ? xas_find_conflict+0x4a6/0x9f0 [ 1767.783086] __add_to_page_cache_locked+0x708/0xcf0 [ 1767.787378] ? file_write_and_wait_range+0x130/0x130 [ 1767.787404] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 1767.787422] ? find_get_entry+0x2d9/0x6e0 [ 1767.789639] ? lru_cache_add+0x45c/0x800 [ 1767.790217] add_to_page_cache_lru+0xe6/0x2e0 [ 1767.790237] ? add_to_page_cache_locked+0x40/0x40 [ 1767.790254] ? __page_cache_alloc+0x10d/0x360 [ 1767.790276] pagecache_get_page+0x38b/0xc80 [ 1767.790300] grab_cache_page_write_begin+0x64/0xa0 [ 1767.790320] ext4_move_extents+0x1237/0x3270 [ 1767.790389] ? lock_acquire+0x197/0x490 [ 1767.790405] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1767.790420] ? lock_release+0x6b0/0x6b0 [ 1767.790438] ? io_schedule_timeout+0x140/0x140 [ 1767.790455] ? __fget_files+0x296/0x480 [ 1767.790481] ? rcu_read_lock_any_held+0x75/0xa0 [ 1767.790500] __ext4_ioctl+0x304d/0x41c0 [ 1767.790514] ? __lock_acquire+0xbb1/0x5b00 [ 1767.790537] ? ext4_reset_inode_seed+0x450/0x450 [ 1767.790555] ? perf_trace_lock+0xac/0x490 [ 1767.790568] ? SOFTIRQ_verbose+0x10/0x10 [ 1767.790610] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1767.801564] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1767.801584] ? do_vfs_ioctl+0x283/0x10d0 [ 1767.801601] ? selinux_inode_getsecctx+0x90/0x90 [ 1767.801615] ? generic_block_fiemap+0x60/0x60 [ 1767.801630] ? __request_module+0x21f/0x9d0 [ 1767.801642] ? __switch_to+0x572/0xff0 [ 1767.801657] ? __switch_to_asm+0x3a/0x60 09:29:18 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) r1 = openat2(r0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x80, 0x16}, 0x18) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) inotify_add_watch(r1, &(0x7f0000000400)='./file0/../file0\x00', 0x880) [ 1767.801680] ? __schedule+0x850/0x1e90 [ 1767.801715] ? ext4_fc_start_update+0xa2/0x2e0 [ 1767.801738] ext4_ioctl+0x46/0x90 [ 1767.801752] ? __ext4_ioctl+0x41c0/0x41c0 [ 1767.801767] __x64_sys_ioctl+0x19a/0x210 [ 1767.801787] do_syscall_64+0x33/0x40 [ 1767.801803] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1767.801814] RIP: 0033:0x7fe0be643b19 [ 1767.801832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1767.801840] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1767.801857] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1767.801866] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1767.801875] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1767.801883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1767.801892] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1767.802144] hpet: Lost 1 RTC interrupts 09:29:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) faccessat2(r0, &(0x7f0000000400)='./file0\x00', 0x100, 0x1180) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) umount2(&(0x7f0000000280)='./file1\x00', 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x8) 09:29:19 executing program 6: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffbf}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r1, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000200)={'ah\x00'}, &(0x7f0000000240)=0x1e) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x4a0000, 0x0) llistxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/23, 0x17) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x410, 0x0, 0x218, 0x0, 0x328, 0x328, 0x328, 0x4, &(0x7f00000002c0), {[{{@uncond, 0xc0, 0xe8}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x5, 0xfffffc00}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x2a}, @remote, 0x0, 0x0, 0x1, 0x0, {@empty, {[0x0, 0x0, 0x569b25a5c1b233ea, 0xff, 0x0, 0xff]}}, {@mac, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}}, 0x3ff, 0x3480, 0xffff, 0x40, 0x8, 0x0, 'ip6erspan0\x00', 'vcan0\x00', {0xff}, {}, 0x0, 0x4}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x3, 0x2604, 0x3, 0x1, 0x0, "ff192eebba0999f3a3edff848a0ff61876e50159904d8b0a5dd9837fc0883d831ae3d034085cf3ecba3c12c202b85f0caa3d7ea62160240051703273a062ea89"}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @private=0xa010100, @broadcast, 0x1, 0xffffffff}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x460) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x8, 0x0) 09:29:19 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b63, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:29:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 12) 09:29:19 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b64, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:29:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:29:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:29:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x162018, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mknodat$loop(r0, &(0x7f0000000280)='./file0/file0\x00', 0x100, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) faccessat2(r1, &(0x7f00000002c0)='./file0/file0/../file0\x00', 0x0, 0x1000) [ 1768.381568] FAULT_INJECTION: forcing a failure. [ 1768.381568] name failslab, interval 1, probability 0, space 0, times 0 [ 1768.383520] CPU: 1 PID: 8939 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1768.384480] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1768.385716] Call Trace: [ 1768.386108] dump_stack+0x107/0x167 [ 1768.386631] should_fail.cold+0x5/0xa [ 1768.387228] ? create_object.isra.0+0x3a/0xa20 [ 1768.387905] should_failslab+0x5/0x20 [ 1768.388452] kmem_cache_alloc+0x5b/0x360 [ 1768.389045] create_object.isra.0+0x3a/0xa20 [ 1768.389673] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1768.390410] kmem_cache_alloc+0x159/0x360 [ 1768.391011] alloc_buffer_head+0x20/0x110 [ 1768.391650] alloc_page_buffers+0x14d/0x6d0 [ 1768.392270] create_empty_buffers+0x2c/0x640 [ 1768.392995] ? wait_on_page_writeback+0xb9/0x2e0 [ 1768.393679] ext4_move_extents+0x26b7/0x3270 [ 1768.394366] ? lock_acquire+0x197/0x490 [ 1768.394939] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1768.395702] ? lock_release+0x6b0/0x6b0 [ 1768.396320] ? __fget_files+0x296/0x480 [ 1768.396907] ? rcu_read_lock_any_held+0x75/0xa0 [ 1768.397576] __ext4_ioctl+0x304d/0x41c0 [ 1768.398146] ? __lock_acquire+0xbb1/0x5b00 [ 1768.398762] ? ext4_reset_inode_seed+0x450/0x450 [ 1768.399443] ? perf_trace_lock+0xac/0x490 [ 1768.400046] ? SOFTIRQ_verbose+0x10/0x10 [ 1768.400654] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1768.401501] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1768.402266] ? do_vfs_ioctl+0x283/0x10d0 [ 1768.402878] ? selinux_inode_getsecctx+0x90/0x90 [ 1768.403599] ? generic_block_fiemap+0x60/0x60 [ 1768.404238] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1768.404948] ? ext4_fc_start_update+0xa2/0x2e0 [ 1768.405599] ext4_ioctl+0x46/0x90 [ 1768.406102] ? __ext4_ioctl+0x41c0/0x41c0 [ 1768.406700] __x64_sys_ioctl+0x19a/0x210 [ 1768.407306] do_syscall_64+0x33/0x40 [ 1768.407848] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1768.408692] RIP: 0033:0x7fe0be643b19 [ 1768.409223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1768.411861] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1768.412952] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1768.413985] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1768.415005] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1768.416046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1768.417056] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1768.575763] hpet: Lost 1 RTC interrupts [ 1782.800158] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:29:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b65, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:29:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mount$9p_unix(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000480), 0x1, &(0x7f00000004c0)={'trans=unix,', {[{@mmap}, {@debug={'debug', 0x3d, 0xffffffff80000001}}, {@uname={'uname', 0x3d, 'btrfs.'}}], [{@uid_gt={'uid>', r0}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) removexattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)=@random={'btrfs.', '\x00'}) 09:29:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:29:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 13) 09:29:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:29:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:29:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000400)='./file0/file0\x00', 0x1) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000000480)='./file0/../file0\x00', 0x401, 0x3, &(0x7f00000006c0)=[{&(0x7f00000004c0)="6118e283558258eac9f31228f20dd6fd9c294e946bacbce1c7db60820f72d3aa4c4bf197457fe95586b335eb518a6478bca5e06863b0aa23012404abf20b3c6e03de5bbd3c143476261cd9268ced2315d82a12a5921036f6846d1bdb8c27dd44236512f58535269c323c5fd9eabb72e026f5bc1f998a06bf14df06e419738e6f121b74fdcb4f0f0c4706eb03a92d65a0656caa89b8ff12b523a1f5d2c4edd23550404a504565f2639399214bdea35492db67b823df70b5c19fbcface020e616cd5ceee51d9561eaef25d51e492bf77065a7ffb8cda5eb73a074882265259ddc7e7611f5a924968d85c85d9edbcf317a0ba44716ad7ee3a97ddd9fad5adf7", 0xfe, 0x1c0000000000}, {&(0x7f00000005c0)="a8ff35d3e1356b513312efa60f6e1faf17fb81b33eaed81fc2518959b77ff287215fc5ddf5da2c5e4375dd58ee5e03f27077a361ce8e9a3bb70186e1ae293714f89bf4cffc0d4b7e4a3e98ef5928b1c85df64d04063f68b0adcb9495caeef54ea11311e6b61d7e99926ef3f3fcfbd93d153760d11ff8ab6dc34a0214dd1e13312d42bbfedcacdb367a88a3cc9ae7bfa1e0bc99", 0x93, 0x4}, {&(0x7f0000000680)="b1a84f9255d567449bdc8a882d346b1e56c6340ebe8c9f9dd8f3a92f3502935d8b11d92ec21adde9bebb42c61a09b7fb4b8a09148e8184", 0x37, 0xfffffffffffffffb}], 0x80, &(0x7f0000000740)={[{@fat=@flush}, {@fat=@fmask={'fmask', 0x3d, 0x3}}, {@fat=@nfs}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_hash}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@measure}, {@pcr={'pcr', 0x3d, 0xf}}, {@hash}, {@subj_user={'subj_user', 0x3d, '\xe8#*$$,)##['}}, {@seclabel}, {@subj_role={'subj_role', 0x3d, '+#+[#\x1b'}}]}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380), 0x48, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='.\x00', 0x40, 0x120) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:29:42 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r0, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$setflags(r1, 0x2, 0x1) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5, &(0x7f0000001780)=[{&(0x7f0000000200)="ca2edf20035db4d2825e0a553b0a0ca65a4a3179c9d2dc292a64bc72652567378c4f5008ae02216a827c8217c5d11401eb5f726a29d96b993237c0c619cb4d0a81a5832df30b14", 0x47}, {&(0x7f0000000280)="9fa98e425e93b655bdd2c736e7280e09bab9e7569d759dcc083a736782ab440c8acbf8e5461f15b3777c9d8def032e915f191a13af117d243396dd5ed42dd4", 0x3f, 0x7fffffff}, {&(0x7f00000002c0)="5b8a754d846ce3f781b03083f5e08bda456eeb916c1c177ddb4f5a96b5b59f9683e7b82e6e31e6cafd55e81e9752264de8a6828d5dd7fa6875193f19d7b7571830fae539f3d86b85a4d203031e876f3068e805d7b7d3d0340b210b5515a06535b2e5474b63283ced0a6a20cf26d0fb6badcf2f050f3f0678155d6a3fc52554c2425031b4899fc019635eb414d3057dfcdc2813ab4cb60937d55d0a6266735e5f20edf62734456af9cf2e98c328dcac77f32ed33fd3ae64861718079b56b99db0ce29755c1abd0293e09d2ddd73061eaeab3a964d683caa", 0xd7, 0x7f}, {&(0x7f00000003c0)="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", 0xfa, 0xff}, {0x0}], 0x5caabce9bcdcc974, &(0x7f0000001880)={[{@noinit_itable}, {@nodiscard}, {@auto_da_alloc}, {@discard}, {@journal_path={'journal_path', 0x3d, './file0'}}], [{@pcr={'pcr', 0x3d, 0x2}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) mount$9p_fd(0x0, &(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00), 0x85, &(0x7f0000001a40)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache}], [{@fsname={'fsname', 0x3d, 'batadv_slave_1\x00'}}, {@obj_role={'obj_role', 0x3d, '/dev/vcsu\x00'}}, {@context={'context', 0x3d, 'user_u'}}]}}) umount2(&(0x7f0000000040)='./file0\x00', 0x4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xb, &(0x7f0000001ec0), &(0x7f0000001f00)=0x4) 09:29:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465662f6c6f6f703000e74cda1e735120de6474512fbe991f03e767d1d089cd18563d4a8832009497e04f22089f2db5b17a0c7aafa6a3fa12b69ad273d6ee572fb6d1fcda77dde9d49b657a5dfea782e36a396bf1fbf60bcbe3b3a47a000000000000000087a40794c2bec217bacd"], &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:29:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b66, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1791.286837] 9pnet: Insufficient options for proto=fd [ 1791.316162] 9pnet: Insufficient options for proto=fd [ 1791.334495] 9pnet: p9_fd_create_unix (8974): problem connecting socket: ./file0/../file0: -111 [ 1791.371884] SELinux: duplicate or incompatible mount options [ 1791.400096] hpet: Lost 2 RTC interrupts [ 1791.406778] FAULT_INJECTION: forcing a failure. [ 1791.406778] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.408436] CPU: 0 PID: 8979 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1791.409477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1791.410596] Call Trace: [ 1791.410976] dump_stack+0x107/0x167 [ 1791.411621] should_fail.cold+0x5/0xa [ 1791.412224] ? create_object.isra.0+0x3a/0xa20 [ 1791.412844] should_failslab+0x5/0x20 [ 1791.413359] kmem_cache_alloc+0x5b/0x360 [ 1791.413906] ? create_object.isra.0+0x3ad/0xa20 [ 1791.414526] create_object.isra.0+0x3a/0xa20 [ 1791.415135] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1791.415859] __kmalloc_node+0x1ae/0x4b0 [ 1791.416404] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1791.417089] memcg_slab_post_alloc_hook+0x1f9/0x3f0 [ 1791.417773] ? trace_hardirqs_on+0x5b/0x180 [ 1791.418363] kmem_cache_alloc+0x171/0x360 [ 1791.418930] alloc_buffer_head+0x20/0x110 [ 1791.419465] alloc_page_buffers+0x14d/0x6d0 [ 1791.420079] create_empty_buffers+0x2c/0x640 [ 1791.420709] ? wait_on_page_writeback+0xb9/0x2e0 [ 1791.421391] ext4_move_extents+0x26b7/0x3270 [ 1791.422035] ? lock_acquire+0x197/0x490 [ 1791.422578] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1791.423293] ? lock_release+0x6b0/0x6b0 [ 1791.423887] ? __fget_files+0x296/0x480 [ 1791.424448] ? rcu_read_lock_any_held+0x75/0xa0 [ 1791.425091] __ext4_ioctl+0x304d/0x41c0 [ 1791.425641] ? __lock_acquire+0xbb1/0x5b00 [ 1791.426234] ? ext4_reset_inode_seed+0x450/0x450 [ 1791.426886] ? perf_trace_lock+0xac/0x490 [ 1791.427457] ? SOFTIRQ_verbose+0x10/0x10 [ 1791.428068] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1791.428838] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1791.429527] ? do_vfs_ioctl+0x283/0x10d0 [ 1791.430067] ? selinux_inode_getsecctx+0x90/0x90 [ 1791.430702] ? generic_block_fiemap+0x60/0x60 [ 1791.431296] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1791.431973] ? ext4_fc_start_update+0xa2/0x2e0 [ 1791.432595] ext4_ioctl+0x46/0x90 [ 1791.433055] ? __ext4_ioctl+0x41c0/0x41c0 [ 1791.433619] __x64_sys_ioctl+0x19a/0x210 [ 1791.434189] do_syscall_64+0x33/0x40 [ 1791.434691] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1791.435419] RIP: 0033:0x7fe0be643b19 [ 1791.435992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1791.438529] RSP: 002b:00007fe0bbb77188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1791.439590] RAX: ffffffffffffffda RBX: 00007fe0be7570e0 RCX: 00007fe0be643b19 [ 1791.440589] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1791.441551] RBP: 00007fe0bbb771d0 R08: 0000000000000000 R09: 0000000000000000 [ 1791.442558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1791.443526] R13: 00007ffeff2af37f R14: 00007fe0bbb77300 R15: 0000000000022000 [ 1791.444813] hpet: Lost 2 RTC interrupts [ 1791.476340] SELinux: duplicate or incompatible mount options [ 1806.194992] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:30:05 executing program 6: msgctl$IPC_RMID(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380), 0xc680, 0x0) 09:30:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$tmpfs(0x0, &(0x7f0000000280)='./file0/../file0/../file0\x00', &(0x7f00000002c0), 0x8800, &(0x7f0000000380)={[], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@subj_user}]}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000440)='ext2\x00', &(0x7f0000000480)='./file0\x00', 0x5, 0x3, &(0x7f0000000780)=[{&(0x7f00000004c0)="45506e319797854a111a7ce5e837ae842da64a8f1216bbb41973099dce4d3fea5ccf0a3089648b989713044724cf33d8b7d62fd1a7f3fecd37db5a696e2287339ec3364ee93c6e54a5672a3adabde51425b04ad994afa2c1d2272143753d663487d2473d8aba78792c15029bfe504f7cf919da144531ae6a5f6bbb1694e74bf8e04bc42d4625a74a9220ad1baa89d365602b9df7c9be9562c5eabccd4eb0ecce12bfa00b2f15f904", 0xa8, 0x80}, {&(0x7f0000000580)="96ca6de64343815da3ebbc2237aa65e9901ca8f7c87652d2f6a861186105c0c4e667a5289da422d9edfa0312a48dc9a6025e68df128c6b68baf56ceb14143dfcf51aa68225cd78ca109d9f616588741fbce8fda4867ec70910cf832ca773e9bb1b4c87c1c52708108fa1f2952519b2f5a750fe57fcac42daa8fbdfad511ea5274ab79684dca59b2cab9148c9540cf63241f9d915410afa189df15b4d76ad93306583df9a9d6fafd6b5a269b702784c7889a23f01a1c9e0f88ec004312b874698a8ee8c190b560aca358bf9af13b69d5213", 0xd1, 0x1}, {&(0x7f0000000680)="d3ffb03f841031d740d6fda92a536c13ff6cd0c508acfdce8b96168592f5c8b40b51adb538fa2627f620a9bb4b4ac102ed21cd0caf02553e1bec06cdaf909c56bd1a546e88a901371adc68122c23352fcea886c7b9772d49dd9113095d20d2e0ca8fcfb9672da89c174bb4c003ad55f524eeb18fc9aef95f1a4908139c3ed586fcaaa6155b30c3ca93a4f2e757bc9c7cc1f9fc86580ece3f8615271106b45647d2db2b76a6d0d0865372d4093e943526521b167435db498b5fc579808f69eef443e561e7284a301bac26adcdc1b47e7c3bf1c44f481ef2e49e971b761fe781ca539b8aa06587a5", 0xe7, 0x8}], 0x5000, &(0x7f0000000800)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@dioread_lock}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x66, 0x30, 0x32, 0x34, 0x39, 0x33, 0x5], 0x2d, [0x37, 0x36, 0x31, 0x62], 0x2d, [0x37, 0x65, 0xe, 0x33], 0x2d, [0x63ddf6bab7bb2ef2, 0x38, 0x37, 0x61], 0x2d, [0x37, 0x61, 0x35, 0x65, 0x66, 0x62, 0x35, 0x65]}}}, {@fowner_lt}, {@context={'context', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r0}}]}) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) 09:30:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x8, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:30:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:30:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b67, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:30:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:30:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 14) 09:30:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1814.755713] tmpfs: Unknown parameter 'obj_role' 09:30:05 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x1, 0x48, 0x32, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0x40, 0x8, 0x9, 0xfffffffffffffc01, 0xfffffffa, 0x1ff, 0x0, 0x6, 0x0, 0x7f}, r1, 0x10, r0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_trie\x00') 09:30:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='\x00', 0x20, 0x6, &(0x7f0000000700)=[{&(0x7f0000000380), 0x0, 0x2}, {&(0x7f0000000400)="b4baa092f9e551118e2201b6bbbab890bd5dbe1f3a7bef333a74530a431490bf2e3334c58c0ce29b8742a90a1dabf2091990a892fe8f218b8e48baf2fa0013c8702591cf54d54e42fed43dcab9c696ea135b78a6b4ea2854757a901dc023c70c23c26aaed50cdf72ec9c38b0bbaaaf4de52cb22b4fc0cb787d6bfad05a962471795cc1028123899cfeb15fb83a253e14238319cc7bd48fce2b6e4fdb03618db6254af3f91ecde7b1e8c6b86715a2406696aa3c2dfb2ed306a126f99b929053e6de1ab24520c74e7c6132a4d8979f05", 0xcf, 0x9}, {&(0x7f0000000500)="41552f0581dbacb92436233fd3ba3c90001cd6788a248fe6c17812cf", 0x1c, 0x4}, {&(0x7f0000000540)="53a3d1e7eec646df3c17cfc634e53ef56c64671b9074bf6849ce3e1a5524f72927ea67605a066c4dc64430a275ab712b9401440eee5d42882e5fc99f9d5d2ecc5d6d2d", 0x43, 0x800}, {&(0x7f00000005c0)="d17d585629c286db1786a929d3f684297cb215a74afb24e62900e6b431381b3925b53241abe098f386482f", 0x2b, 0x6a}, {&(0x7f0000000600)="9ff49811dd248888b29ba481bf2c9298e46f3566a60d7089cb57100da909bb18f1fd105659a4494c063e941fd7fb31fe1b885d72b2fa872f15e2b1782ea97e2b78462f08af6748aa58d599a025ec650c0c85582758a0ee96c1a0e01bb8978bb31aaf65799088fb66de7b90a21a9f85a4ad35a6e4168b1b429514f7d462ab09be75c290f0e1cd06f30491f1279d14b961e66e518d110a49f8cf4fb1c6526325625e64af3f765ba3bac4bb0690c8144c60aff025e337d4486df1d97317b1d1cc6fd8a365c16fee62b2379312a6a7e6c10875a7a1983f64dd704d1b9ad9bc", 0xdd, 0x5}], 0x0, &(0x7f00000007c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x31, 0x74, 0x31]}}, {@mode={'mode', 0x3d, 0x8001}}, {@huge_always}, {@gid}, {@nr_inodes={'nr_inodes', 0x3d, [0x38, 0x2d, 0x74, 0x37, 0x6, 0x34, 0x25, 0x30]}}, {@huge_within_size}], [{@dont_measure}, {@subj_type={'subj_type', 0x3d, 'tmpfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'tmpfs\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'tmpfs\x00'}}, {@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise}]}) 09:30:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b68, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:30:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, 0x0, &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:30:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000002c0)='./file0/../file0\x00', 0x20000000000, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) fspick(r0, &(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1020, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1814.937216] FAULT_INJECTION: forcing a failure. [ 1814.937216] name failslab, interval 1, probability 0, space 0, times 0 [ 1814.938854] CPU: 1 PID: 9012 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1814.939775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1814.941015] Call Trace: [ 1814.941384] dump_stack+0x107/0x167 [ 1814.941890] should_fail.cold+0x5/0xa [ 1814.942412] ? mempool_alloc+0x148/0x360 [ 1814.942952] ? mempool_free_pages+0x20/0x20 [ 1814.943527] should_failslab+0x5/0x20 [ 1814.944041] kmem_cache_alloc+0x5b/0x360 [ 1814.944638] ? mempool_free_pages+0x20/0x20 [ 1814.945216] mempool_alloc+0x148/0x360 [ 1814.945755] ? mempool_resize+0x7d0/0x7d0 [ 1814.946334] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1814.946946] ? __lockdep_reset_lock+0x180/0x180 [ 1814.947572] ? create_empty_buffers+0xbc/0x640 [ 1814.948225] bio_alloc_bioset+0x36e/0x600 [ 1814.948786] ? bvec_alloc+0x2f0/0x2f0 [ 1814.949300] ? _ext4_get_block+0x122/0x570 [ 1814.949878] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 1814.950537] ? block_commit_write+0x30/0x30 [ 1814.951116] ext4_read_bh+0x134/0x330 [ 1814.951597] ext4_move_extents+0x2294/0x3270 [ 1814.952191] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1814.952815] ? lock_release+0x6b0/0x6b0 [ 1814.953395] ? __fget_files+0x296/0x480 [ 1814.953943] ? rcu_read_lock_any_held+0x75/0xa0 [ 1814.954572] __ext4_ioctl+0x304d/0x41c0 [ 1814.955108] ? __lock_acquire+0xbb1/0x5b00 [ 1814.955686] ? ext4_reset_inode_seed+0x450/0x450 [ 1814.956431] ? perf_trace_lock+0xac/0x490 [ 1814.956995] ? SOFTIRQ_verbose+0x10/0x10 [ 1814.957572] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1814.958359] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1814.959073] ? do_vfs_ioctl+0x283/0x10d0 [ 1814.959630] ? selinux_inode_getsecctx+0x90/0x90 [ 1814.960290] ? generic_block_fiemap+0x60/0x60 [ 1814.960902] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1814.961576] ? ext4_fc_start_update+0xa2/0x2e0 [ 1814.962219] ext4_ioctl+0x46/0x90 [ 1814.962695] ? __ext4_ioctl+0x41c0/0x41c0 [ 1814.963259] __x64_sys_ioctl+0x19a/0x210 [ 1814.963815] do_syscall_64+0x33/0x40 [ 1814.964364] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1814.965064] RIP: 0033:0x7fe0be643b19 [ 1814.965575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1814.968077] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1814.969115] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1814.970077] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1814.971042] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1814.972122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1814.973101] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 09:30:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b69, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:30:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 15) 09:30:06 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b6a, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:30:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, 0x0, &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1815.562980] FAULT_INJECTION: forcing a failure. [ 1815.562980] name failslab, interval 1, probability 0, space 0, times 0 [ 1815.565247] CPU: 0 PID: 9044 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1815.566259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1815.567423] Call Trace: [ 1815.567805] dump_stack+0x107/0x167 [ 1815.568327] should_fail.cold+0x5/0xa [ 1815.568898] ? mempool_alloc+0x148/0x360 [ 1815.569506] ? mempool_free_pages+0x20/0x20 [ 1815.570146] should_failslab+0x5/0x20 [ 1815.570704] kmem_cache_alloc+0x5b/0x360 [ 1815.571269] ? mempool_free_pages+0x20/0x20 [ 1815.571895] mempool_alloc+0x148/0x360 [ 1815.572488] ? mempool_resize+0x7d0/0x7d0 [ 1815.573089] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1815.573759] ? _raw_spin_unlock_irq+0x27/0x30 [ 1815.574418] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1815.575098] ? finish_task_switch+0x126/0x5d0 [ 1815.575771] ? finish_task_switch+0xef/0x5d0 [ 1815.576421] bio_alloc_bioset+0x36e/0x600 [ 1815.577034] ? bvec_alloc+0x2f0/0x2f0 [ 1815.577577] ? io_schedule_timeout+0x140/0x140 [ 1815.578247] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 1815.578975] ? block_commit_write+0x30/0x30 [ 1815.579600] ext4_read_bh+0x134/0x330 [ 1815.580172] ext4_move_extents+0x2294/0x3270 [ 1815.580915] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1815.581664] ? lock_release+0x6b0/0x6b0 [ 1815.582259] ? __fget_files+0x296/0x480 [ 1815.582844] ? rcu_read_lock_any_held+0x75/0xa0 [ 1815.583525] __ext4_ioctl+0x304d/0x41c0 [ 1815.584139] ? __lock_acquire+0xbb1/0x5b00 [ 1815.584781] ? ext4_reset_inode_seed+0x450/0x450 [ 1815.585449] ? perf_trace_lock+0xac/0x490 [ 1815.586029] ? SOFTIRQ_verbose+0x10/0x10 [ 1815.586624] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1815.587448] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1815.588201] ? do_vfs_ioctl+0x283/0x10d0 [ 1815.588786] ? selinux_inode_getsecctx+0x90/0x90 [ 1815.589448] ? generic_block_fiemap+0x60/0x60 [ 1815.590143] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1815.590878] ? ext4_fc_start_update+0xa2/0x2e0 [ 1815.591528] ext4_ioctl+0x46/0x90 [ 1815.592021] ? __ext4_ioctl+0x41c0/0x41c0 [ 1815.592640] __x64_sys_ioctl+0x19a/0x210 [ 1815.593231] do_syscall_64+0x33/0x40 [ 1815.593778] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1815.594504] RIP: 0033:0x7fe0be643b19 [ 1815.595037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1815.597665] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1815.598743] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1815.599830] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1815.600880] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1815.601965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1815.602982] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1815.604201] hpet: Lost 1 RTC interrupts [ 1829.783141] kmemleak: 40 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:30:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xa, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:30:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:30:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x521001, 0x0) faccessat(r0, &(0x7f00000002c0)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x1, 0x20) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) recvfrom$unix(r0, &(0x7f0000000400)=""/71, 0x47, 0x0, 0x0, 0x0) 09:30:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) syz_mount_image$vfat(&(0x7f00000004c0), &(0x7f0000000500)='./file0/../file0\x00', 0xcaa, 0x3, &(0x7f0000000780)=[{&(0x7f0000000540)="9649ccccdef08d9f6f9b9f3ac5b2fc50aaa334ce77906d6d1623cc3c67279bac9423d4ef4f708bd531721d70d73aabc23aa575d4e13225e01244e1b42a9862c2708c6f4318f0c62ef1a20729a7bd3dc56fe6c433221bc7c2bda3d15445218e88794d2447f8c5f4e8370934c4cf992e3e86528db3b02f8be8a24d839d4ac8c1ca1a8596bb3954ea4c1b68c24034781919bd465dd4649e3c0d63e05daab5fd24e2e7ea3450f51c81c72ca925aedb871c24ed4171f3d541bfda412b1565f5a512aa63bb", 0xc2, 0x1}, {&(0x7f0000000640)="259de95376e3aecb46df0e83208b837a9245dc649246e0137700422bd05a2e36f57fe030dd03de83e772545ade2647b6b597c575bd0029c9bf4b7f2546a1da8674f7c8672bcf25cdd38d50cd8a72201dbc95918d91eec46bf895c997ca3fd79acca133000776a0dd7540b322270a025ea0f969f42f8f4d1297cc1a", 0x7b, 0x7fffffff}, {&(0x7f00000006c0)="00bbbae3f3b3e425a3866371c1fb088d6a18f1eac5d0c2d46c13d9db00b77a1c74a5a475174f686ee3b13b456a0847b151fd22f5b5021839f4014f763c88af17343cd3b4aacd3dbda12a78b3144e7e1e5284310e43ea73b32dd7980a73f11fc571ca44d9d7ffde7c3a7d57b920e30d5877d236fd36d120fa69e32f4249d38a8319a25a6a6bc6c7f3de0f914891c91704a5c2c40bf014bd61413cf60d7cee8d422dcf205e", 0xa4, 0x2}], 0x4cc0cbbfa2873dc5, &(0x7f0000000800)={[{@shortname_winnt}, {@uni_xlate}, {@rodir}, {@utf8no}], [{@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x54, 0x66, 0x63, 0x30, 0x33, 0x39, 0x62, 0x32], 0x2d, [0x37, 0x31, 0x64, 0x66], 0x2d, [0x32, 0x62, 0x61, 0x33], 0x2d, [0x39, 0x66, 0x0, 0x3], 0x2d, [0x39, 0x35, 0x31, 0x36, 0x64, 0x0, 0x65, 0x38]}}}, {@dont_measure}, {@measure}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x8000}}]}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400), 0x800, &(0x7f0000000440)={'trans=unix,', {[{@access_user}, {@access_user}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@hash}]}}) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:29 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b70, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:30:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, 0x0, &(0x7f0000000380)='ramfs\x00', 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:30:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 16) 09:30:29 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b71, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1838.392886] 9pnet: p9_fd_create_unix (9059): problem connecting socket: ./file0: -111 09:30:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1838.463713] 9pnet: p9_fd_create_unix (9068): problem connecting socket: ./file0: -111 09:30:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) [ 1838.500839] FAULT_INJECTION: forcing a failure. [ 1838.500839] name failslab, interval 1, probability 0, space 0, times 0 [ 1838.502605] CPU: 1 PID: 9071 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1838.503647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1838.504841] Call Trace: [ 1838.505228] dump_stack+0x107/0x167 [ 1838.505758] should_fail.cold+0x5/0xa [ 1838.506318] ? create_task_io_context+0x2c/0x430 [ 1838.506995] should_failslab+0x5/0x20 [ 1838.507541] kmem_cache_alloc_node+0x55/0x370 [ 1838.508182] create_task_io_context+0x2c/0x430 [ 1838.508886] submit_bio_checks+0x1407/0x18e0 [ 1838.509514] ? __lock_acquire+0xbb1/0x5b00 [ 1838.510135] ? trace_event_raw_event_block_rq_requeue+0x560/0x560 [ 1838.511045] submit_bio_noacct+0x7a/0xcf0 [ 1838.511638] ? __lockdep_reset_lock+0x180/0x180 [ 1838.512309] ? blk_queue_enter+0xb80/0xb80 [ 1838.512956] ? find_held_lock+0x2c/0x110 [ 1838.513567] submit_bio+0xf3/0x4e0 [ 1838.514090] ? submit_bio_noacct+0xcf0/0xcf0 [ 1838.514739] submit_bh_wbc.constprop.0+0x580/0x780 [ 1838.515463] ? block_commit_write+0x30/0x30 [ 1838.516073] ext4_read_bh+0x134/0x330 [ 1838.516644] ext4_move_extents+0x2294/0x3270 [ 1838.517347] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1838.518111] ? lock_release+0x6b0/0x6b0 [ 1838.518795] ? __fget_files+0x296/0x480 [ 1838.519411] ? rcu_read_lock_any_held+0x75/0xa0 [ 1838.520112] __ext4_ioctl+0x304d/0x41c0 [ 1838.520719] ? __lock_acquire+0xbb1/0x5b00 [ 1838.521371] ? ext4_reset_inode_seed+0x450/0x450 [ 1838.522056] ? perf_trace_lock+0xac/0x490 [ 1838.522672] ? SOFTIRQ_verbose+0x10/0x10 [ 1838.523342] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1838.524158] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1838.524952] ? do_vfs_ioctl+0x283/0x10d0 [ 1838.525554] ? selinux_inode_getsecctx+0x90/0x90 [ 1838.526245] ? generic_block_fiemap+0x60/0x60 [ 1838.526912] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1838.527630] ? ext4_fc_start_update+0xa2/0x2e0 [ 1838.528297] ext4_ioctl+0x46/0x90 [ 1838.528849] ? __ext4_ioctl+0x41c0/0x41c0 [ 1838.529444] __x64_sys_ioctl+0x19a/0x210 [ 1838.530042] do_syscall_64+0x33/0x40 [ 1838.530584] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1838.531328] RIP: 0033:0x7fe0be643b19 [ 1838.531893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1838.534637] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1838.535745] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1838.536791] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1838.537767] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1838.538744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1838.539740] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 09:30:29 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b72, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:30:29 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32=r0]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:29 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00e99b002e2f7f696c65302f66696c655200"]) r3 = openat(r0, &(0x7f0000000400)='./file0\x00', 0x2081, 0x0) openat(r3, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x0) move_mount(r1, &(0x7f0000000280)='./file1\x00', r2, &(0x7f0000000380)='./file0/file0\x00', 0x32) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1853.069211] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:30:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:30:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4bfa, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:30:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x972000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 17) 09:30:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) 09:30:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:30:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:30:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) statx(r0, &(0x7f0000000700)='./file0/file0\x00', 0x4000, 0x2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x3, &(0x7f0000000680)=[{&(0x7f0000000400)="1cd1a4f6512ba9aa607a82717d7a7d561d67f200d8721a4e0dc894708a22016dbe6edc0baaf87e5076bf26a24413235b90c7abc058eeede45286f3019438c987bb450d237c7b0804bfd21e6fb2305a568952580f81ef11556819ca98", 0x5c}, {&(0x7f0000000480)="51c068af537ba93ad18cc2260680e3cb4383281d46c73945caaefe1c446ceb443c298e9db948d5419b568e9d3b432b41a2d296d8ce6c980ae3865fd390107126c04699c608f14863fef53de417ee356e77fea9163e10254a3045b8c10e7ad748b185fa388bd43ba0ca0b2d3401fbd19b92dcdc447e3e1490641586d20a708e93f60dd8abe27fa508a801a664bc82c0e7422bf68930b8373b0988f25aed0df532b56fca9279a195afc54460f95a85a82cd1d648cf9ce5355bc3116e8a9c0604ad618cc55b461ea5362013c9a1fd647db7db11e4205a1846abb1c8317223b25c314094fe5465e6cf", 0xe7, 0x1}, {&(0x7f0000000580)="7db4a69d9501e8e26c7a80cef804b3756fe637fc70ca92dc47821e0c6e948b9a5f2334de579c62eb860b0f283b598a0a86c6b95f295fdff1a653b4320f4a295be54c1faa0de7c6fdfbeaba9ff147f2223b6cc3717b7b5cb78de17a839b7643c98193e023f502a525922622deb67373759437e5308e12003442df50f712aad35fe431f6449be79c64ff47cc80598c333f955e2d5116e3ea1e1f6b5525bf9be33e2b857068281e4a10a3b0bdc9a2054618049e3a9112d2ce80fb3bcb999f00672ac09c09d831cae67f11f46df35eeb7a6096728401c1dcb22ab51a97cba244c8a78020", 0xe2, 0x10001}], 0x1088007, &(0x7f0000000840)={[{@mode={'mode', 0x3d, 0x1}}, {@huge_never}], [{@fsmagic={'fsmagic', 0x3d, 0x1ad6}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', r1}}, {@subj_type={'subj_type', 0x3d, 'tmpfs\x00'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@appraise_type}]}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4bfb, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1860.382698] FAULT_INJECTION: forcing a failure. [ 1860.382698] name failslab, interval 1, probability 0, space 0, times 0 [ 1860.385274] CPU: 0 PID: 9112 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1860.386676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1860.388365] Call Trace: [ 1860.388923] dump_stack+0x107/0x167 [ 1860.389677] should_fail.cold+0x5/0xa [ 1860.390459] ? mark_lock+0xf5/0x2df0 [ 1860.391223] ? create_object.isra.0+0x3a/0xa20 [ 1860.392161] should_failslab+0x5/0x20 [ 1860.392967] kmem_cache_alloc+0x5b/0x360 [ 1860.393806] ? lock_chain_count+0x20/0x20 [ 1860.394667] create_object.isra.0+0x3a/0xa20 [ 1860.395572] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1860.396615] kmem_cache_alloc_node+0x169/0x370 [ 1860.397567] create_task_io_context+0x2c/0x430 [ 1860.398509] submit_bio_checks+0x1407/0x18e0 [ 1860.399405] ? __lock_acquire+0xbb1/0x5b00 [ 1860.400278] ? trace_event_raw_event_block_rq_requeue+0x560/0x560 [ 1860.401585] submit_bio_noacct+0x7a/0xcf0 [ 1860.402428] ? __lockdep_reset_lock+0x180/0x180 [ 1860.403374] ? blk_queue_enter+0xb80/0xb80 [ 1860.404257] ? find_held_lock+0x2c/0x110 [ 1860.405118] submit_bio+0xf3/0x4e0 [ 1860.405849] ? submit_bio_noacct+0xcf0/0xcf0 [ 1860.406771] submit_bh_wbc.constprop.0+0x580/0x780 [ 1860.407787] ? block_commit_write+0x30/0x30 [ 1860.408680] ext4_read_bh+0x134/0x330 [ 1860.409474] ext4_move_extents+0x2294/0x3270 [ 1860.410468] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1860.411530] ? lock_release+0x6b0/0x6b0 [ 1860.412355] ? __fget_files+0x296/0x480 [ 1860.413192] ? rcu_read_lock_any_held+0x75/0xa0 [ 1860.414159] __ext4_ioctl+0x304d/0x41c0 [ 1860.414981] ? __lock_acquire+0xbb1/0x5b00 [ 1860.415872] ? ext4_reset_inode_seed+0x450/0x450 [ 1860.416872] ? perf_trace_lock+0xac/0x490 [ 1860.417714] ? SOFTIRQ_verbose+0x10/0x10 [ 1860.418594] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1860.419772] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1860.420849] ? do_vfs_ioctl+0x283/0x10d0 [ 1860.421684] ? selinux_inode_getsecctx+0x90/0x90 [ 1860.422661] ? generic_block_fiemap+0x60/0x60 [ 1860.423568] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1860.424587] ? ext4_fc_start_update+0xa2/0x2e0 [ 1860.425559] ext4_ioctl+0x46/0x90 [ 1860.426276] ? __ext4_ioctl+0x41c0/0x41c0 [ 1860.427129] __x64_sys_ioctl+0x19a/0x210 [ 1860.427973] do_syscall_64+0x33/0x40 [ 1860.428755] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1860.429809] RIP: 0033:0x7fe0be643b19 [ 1860.430577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1860.434359] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1860.435917] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1860.437400] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1860.438863] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1860.440321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1860.441789] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1860.443598] hpet: Lost 3 RTC interrupts 09:30:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:30:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x18008, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:30:51 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000380)=0x6e, 0x40000) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mknodat$loop(r0, &(0x7f00000002c0)='./file0/../file0\x00', 0x6000, 0x1) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:51 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) quotactl(0xec10, &(0x7f0000000a40)='./file0/file0/file0\x00', r3, &(0x7f0000000a80)="a25aaa58dd85cfb566dd08a52be3afdf071a44b37d0f1329ef25") syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x673f, 0x8, &(0x7f0000000880)=[{&(0x7f0000000400)="4efefa4e8335bebd1c9c7dfdeff236203e8b8eb80868d2d2bb4d21c297c7a496d7c72d2a5f214e9ddba6349768bca051e5365d11f19d4b629c0331adf3b1899384f543c0f0fd1e9a06c81332992334594a2eab1b9a1412933eddbbee81a7ceac5476c1bdb979501cdf7de6efd95db3985fd400b98a00f5e7b665dc37e7a754d5d07e3a1f24dea510ee8e19b990deb4fdf298b4f286ceffe527ff3240", 0x9c, 0x7f}, {&(0x7f0000000380)="7e51fe788a425402f5c3056e569d8fdab5b3a85d7c4f83eab696126457c70b8cbf35bc01e0811749d51234f2a91a8f288cdcdd58ad98e0ec39df20c2e1", 0x3d, 0x2}, {&(0x7f00000004c0)="9f84990659c1ac480db40bcf5868bbd638021900fc5f57dc77eeeaedfaf57470614c8efcaa9e132722dd1ee27529427d5b07187de7f0e6d41a1c8025fdd95cb904ffeada19173dd3275baa86c970d539d9bf3fb1f20e4fbcad11c07cf16f3204a2afe6adc5d941ea394de2bc7d28f84f76b1f4", 0x73, 0x3}, {&(0x7f0000000540)="a4831337ba08b7faa25559b9c4d90a2ef28e8390eec2fab8c228eae5999373c786d5e65745bceccc691e9b931eb5d0444e77ec67b339aede699eb4e8be193c04d2b6caa7db7463d77698a1272fd516541c0327c9f9e05a381440b3bbae5e2648b180534409168ba8023ef40ec052934915828ff876cb9bc30635681bba8fc0d7586711507c0fbef1439de9f608d2db7fdd0ba8878411b35cfc6dfa4adc7ca8846076e327f63f329ec1a1ebb9d531181d187ac25e41bee49b2441e399676e2251364a365e18686cf34f09", 0xca, 0x68}, {&(0x7f0000000640)="47c4c5af6953b2795b713222e1ec8bd3d3a5bf722a5c6d4a5bd524bf9ec163f3bc25b828764207f8622740e487d0187b3b4495cd74a0e724090a6239b9d20c56", 0x40, 0xfffffffffffffffd}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="dd247ebadfcfe6b29ff606", 0xb, 0xae}, {&(0x7f00000007c0)="5784b25946543644148d18f877e1b001aa93544c96f8d44786f4e9195161db4db2748ed6e32d41cf5f59a9b833b869dab21e83659db3d2a8b1d72b2786d4896291264207a42f8872fc578ddf8e4be6b6b808bcf7e73b5ce12b3db17faf84da295a5adbd995e34ef308cda87f4a58166a28cd426bdb52b9974ca8e79955803bf3e42556875a48684912addf5edf7accb9b25932a20f1b91f57d85f850b0770ea739d1264afbe447314d160ea64de8e0198b13a22375b744eac97f", 0xba, 0x6}], 0x800400, &(0x7f0000000940)={[], [{@fsname={'fsname', 0x3d, '&'}}, {@measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '.{'}}]}) fchownat(r2, &(0x7f0000000980)='./file0/../file0\x00', 0xffffffffffffffff, 0xee01, 0x1000) pivot_root(&(0x7f0000000b00)='./file0/../file0\x00', &(0x7f0000000b40)='./file0/file0/file0\x00') mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f0000000ac0)='./file0/file0/file0\x00', &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0xb009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 18) 09:30:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:30:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5409, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1861.003640] FAULT_INJECTION: forcing a failure. [ 1861.003640] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.005849] CPU: 0 PID: 9139 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1861.006910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1861.008202] Call Trace: [ 1861.008629] dump_stack+0x107/0x167 [ 1861.009219] should_fail.cold+0x5/0xa [ 1861.009823] ? create_object.isra.0+0x3a/0xa20 [ 1861.010536] should_failslab+0x5/0x20 [ 1861.011141] kmem_cache_alloc+0x5b/0x360 [ 1861.011786] ? stack_trace_consume_entry+0x160/0x160 [ 1861.012597] create_object.isra.0+0x3a/0xa20 [ 1861.013296] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1861.014129] kmem_cache_alloc+0x159/0x360 [ 1861.014818] __es_insert_extent+0x3a9/0x12f0 [ 1861.015552] ? __es_tree_search.isra.0+0x1af/0x220 [ 1861.016356] __es_remove_extent+0x4a9/0x15d0 [ 1861.017104] ? __es_shrink+0x870/0x870 [ 1861.017745] ? lock_release+0x6b0/0x6b0 [ 1861.018402] ? do_raw_write_lock+0x11a/0x280 [ 1861.019139] ? do_raw_read_unlock+0x70/0x70 [ 1861.019845] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1861.020741] ext4_es_remove_extent+0x1fa/0x3f0 [ 1861.021487] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1861.022301] ? lock_acquire+0x197/0x490 [ 1861.022950] ? ext4_move_extents+0x25d2/0x3270 [ 1861.023712] ext4_swap_extents+0x224/0x14c0 [ 1861.024419] ? __schedule+0x850/0x1e90 [ 1861.025114] ? ext4_get_es_cache+0x600/0x600 [ 1861.025830] ? down_write_nested+0xe4/0x160 [ 1861.026581] ? rwsem_down_write_slowpath+0xc00/0xc00 [ 1861.027407] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1861.028374] ext4_move_extents+0x1a4f/0x3270 [ 1861.029161] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1861.030049] ? lock_release+0x6b0/0x6b0 [ 1861.030704] ? __fget_files+0x296/0x480 [ 1861.031374] ? rcu_read_lock_any_held+0x75/0xa0 [ 1861.032127] __ext4_ioctl+0x304d/0x41c0 [ 1861.032800] ? __lock_acquire+0xbb1/0x5b00 [ 1861.033499] ? ext4_reset_inode_seed+0x450/0x450 [ 1861.034282] ? perf_trace_lock+0xac/0x490 [ 1861.034950] ? SOFTIRQ_verbose+0x10/0x10 [ 1861.035661] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1861.036585] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1861.037454] ? do_vfs_ioctl+0x283/0x10d0 [ 1861.038107] ? selinux_inode_getsecctx+0x90/0x90 [ 1861.038913] ? generic_block_fiemap+0x60/0x60 [ 1861.039638] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1861.040466] ? ext4_fc_start_update+0xa2/0x2e0 [ 1861.041220] ext4_ioctl+0x46/0x90 [ 1861.041808] ? __ext4_ioctl+0x41c0/0x41c0 [ 1861.042482] __x64_sys_ioctl+0x19a/0x210 [ 1861.043184] do_syscall_64+0x33/0x40 [ 1861.043786] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1861.044635] RIP: 0033:0x7fe0be643b19 [ 1861.045250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1861.048322] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1861.049542] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1861.050745] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1861.051928] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1861.053114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1861.054304] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1861.055661] hpet: Lost 2 RTC interrupts 09:30:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xf, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:30:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:30:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:30:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, &(0x7f0000000400)='tmpfs\x00') mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:30:52 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100828, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="97be29ef66ff0f61762f6d643000"], &(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='cramfs\x00', 0x400, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x100000, &(0x7f00000005c0)=ANY=[@ANYRES32, @ANYRES16]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580), 0x200840, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000380), 0x1, 0x440080) mkdirat(r1, &(0x7f0000000400)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) pivot_root(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000600)='./file0\x00') r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000440)={r2, 0x8, 0x8, 0xaa47}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:30:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x540b, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1861.289226] EXT4-fs (sda): Unrecognized mount option "18446744073709551615" or missing value [ 1861.317403] EXT4-fs (sda): Unrecognized mount option "18446744073709551615" or missing value [ 1877.795283] kmemleak: 61 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:31:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x11, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:31:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 19) 09:31:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:31:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:31:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000280)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file0/file0\x00', 0x0, 0x3b2029, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='./file0/file0/file0\x00', 0x0, 0x9020, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x21d8c1, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:31:16 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x540c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:31:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:31:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000002c0)='./file0/../file0\x00', 0xffffffff, 0x0, 0x0, 0x100430, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1885.894444] EXT4-fs (sda): re-mounted. Opts: 09:31:17 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x540d, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1885.933817] FAULT_INJECTION: forcing a failure. [ 1885.933817] name failslab, interval 1, probability 0, space 0, times 0 [ 1885.936646] CPU: 0 PID: 9184 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1885.938286] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1885.940277] Call Trace: [ 1885.940920] dump_stack+0x107/0x167 [ 1885.941829] should_fail.cold+0x5/0xa [ 1885.942758] ? create_object.isra.0+0x3a/0xa20 [ 1885.943862] should_failslab+0x5/0x20 [ 1885.944782] kmem_cache_alloc+0x5b/0x360 [ 1885.945785] ? stack_trace_consume_entry+0x160/0x160 [ 1885.947018] create_object.isra.0+0x3a/0xa20 [ 1885.948077] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1885.949326] kmem_cache_alloc+0x159/0x360 [ 1885.950345] __es_insert_extent+0x3a9/0x12f0 [ 1885.951432] ? __es_tree_search.isra.0+0x1af/0x220 [ 1885.952626] __es_remove_extent+0x4a9/0x15d0 [ 1885.953748] ? __es_shrink+0x870/0x870 [ 1885.954700] ? lock_release+0x6b0/0x6b0 [ 1885.955681] ? do_raw_write_lock+0x11a/0x280 [ 1885.956747] ? do_raw_read_unlock+0x70/0x70 [ 1885.957798] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1885.959083] ext4_es_remove_extent+0x1fa/0x3f0 [ 1885.960185] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1885.961338] ? lock_acquire+0x197/0x490 [ 1885.962302] ? ext4_move_extents+0x25d2/0x3270 [ 1885.963427] ext4_swap_extents+0x224/0x14c0 [ 1885.964472] ? __schedule+0x850/0x1e90 [ 1885.965461] ? ext4_get_es_cache+0x600/0x600 [ 1885.966522] ? down_write_nested+0xe4/0x160 [ 1885.967563] ? rwsem_down_write_slowpath+0xc00/0xc00 [ 1885.968776] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1885.970160] ext4_move_extents+0x1a4f/0x3270 [ 1885.971324] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1885.972588] ? lock_release+0x6b0/0x6b0 [ 1885.973582] ? __fget_files+0x296/0x480 [ 1885.974554] ? rcu_read_lock_any_held+0x75/0xa0 [ 1885.975668] __ext4_ioctl+0x304d/0x41c0 [ 1885.976618] ? __lock_acquire+0xbb1/0x5b00 [ 1885.977653] ? ext4_reset_inode_seed+0x450/0x450 [ 1885.978796] ? perf_trace_lock+0xac/0x490 [ 1885.979785] ? SOFTIRQ_verbose+0x10/0x10 [ 1885.980805] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1885.982180] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1885.983415] ? do_vfs_ioctl+0x283/0x10d0 [ 1885.984384] ? selinux_inode_getsecctx+0x90/0x90 [ 1885.985531] ? generic_block_fiemap+0x60/0x60 [ 1885.986610] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1885.987800] ? ext4_fc_start_update+0xa2/0x2e0 [ 1885.988902] ext4_ioctl+0x46/0x90 [ 1885.989737] ? __ext4_ioctl+0x41c0/0x41c0 [ 1885.990727] __x64_sys_ioctl+0x19a/0x210 [ 1885.991704] do_syscall_64+0x33/0x40 [ 1885.992593] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1885.993830] RIP: 0033:0x7fe0be643b19 [ 1885.994721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1885.999083] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1886.000890] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1886.002591] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1886.004282] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1886.005992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1886.007745] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1886.009759] hpet: Lost 4 RTC interrupts 09:31:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x172010, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1886.019607] EXT4-fs (sda): re-mounted. Opts: 09:31:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:31:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 1901.349200] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:31:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x48, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:31:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="2e06bee1153c5fbcf83865302f662a78935b3816867020a90ffa63db3ef6bdfdbfd2a39f62014591a06100"], &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='exfat\x00', 0x80, &(0x7f0000000440)='!\r\\:\x00') mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80002, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:31:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 20) 09:31:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x540e, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:31:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:31:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:31:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) openat(r0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x52) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000380)='./file0/../file0\x00', 0x8, 0x3, &(0x7f0000001540)=[{&(0x7f0000000400)="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", 0x1000, 0x1}, {&(0x7f0000001400)="12f8a36da772dcff58fb6ee06174209a74331e5974bde9b0fda50cbaecdebacdee1a83e76b958caeed1fce057723101903a2cc1ca0f5bb0ad8a030dba0847a83b94098a90a170f1394d3e660752957480676c12e35ca0e990c0f7e3a1739084c29e790e3dd52932f69563ed02358", 0x6e, 0x7}, {&(0x7f0000001480)="96722d3c9070441f3e4aafc0e34743eefe9546d1d36230d43d22b1532bc722cfb8ac51e5bdd2555ab8bd7d584a7dc5a6ad5f48c65620152b2271e3f6971b335faf6d38b8590ba762142146d11a458b7f16f1f153b69bf0ad02d0d6112935324af9c1047ed439087308a9d669d539293805951d4255f7d1364d3a85bf62a3ad1395544ec7cbd57120fff4ce1db846b8dc50e282296eb0ece22d81fbc0bdc5b02358cf5336a62e95abd980d30e", 0xac, 0x8}], 0x20001, &(0x7f00000015c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@obj_user}, {@obj_user={'obj_user', 0x3d, 'tmpfs\x00'}}, {@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@appraise}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:31:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:31:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x540f, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 1911.139778] FAULT_INJECTION: forcing a failure. [ 1911.139778] name failslab, interval 1, probability 0, space 0, times 0 [ 1911.141556] CPU: 1 PID: 9227 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1911.142472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1911.143598] Call Trace: [ 1911.143968] dump_stack+0x107/0x167 [ 1911.144585] should_fail.cold+0x5/0xa [ 1911.145138] ? __es_insert_extent+0x3a9/0x12f0 [ 1911.145832] should_failslab+0x5/0x20 [ 1911.146386] kmem_cache_alloc+0x5b/0x360 [ 1911.146962] __es_insert_extent+0x3a9/0x12f0 [ 1911.147630] ? __es_tree_search.isra.0+0x1af/0x220 [ 1911.148300] __es_remove_extent+0x4a9/0x15d0 [ 1911.148914] ? __es_shrink+0x870/0x870 [ 1911.149476] ? lock_release+0x6b0/0x6b0 [ 1911.150049] ? ext4_es_remove_extent+0x205/0x3f0 [ 1911.150704] ? do_raw_write_lock+0x11a/0x280 [ 1911.151313] ? do_raw_read_unlock+0x70/0x70 [ 1911.151916] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1911.152647] ext4_es_remove_extent+0x1fa/0x3f0 [ 1911.153331] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1911.154016] ? lock_acquire+0x197/0x490 [ 1911.154574] ? ext4_move_extents+0x1a13/0x3270 [ 1911.155212] ext4_swap_extents+0x283/0x14c0 [ 1911.155847] ? ext4_get_es_cache+0x600/0x600 [ 1911.156459] ? down_write_nested+0xe4/0x160 [ 1911.157068] ? rwsem_down_write_slowpath+0xc00/0xc00 [ 1911.157802] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1911.158602] ext4_move_extents+0x1a4f/0x3270 [ 1911.159295] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1911.160047] ? lock_release+0x6b0/0x6b0 [ 1911.160699] ? __fget_files+0x296/0x480 [ 1911.161266] ? rcu_read_lock_any_held+0x75/0xa0 [ 1911.161953] __ext4_ioctl+0x304d/0x41c0 [ 1911.162509] ? __lock_acquire+0xbb1/0x5b00 [ 1911.163116] ? ext4_reset_inode_seed+0x450/0x450 [ 1911.163783] ? perf_trace_lock+0xac/0x490 [ 1911.164356] ? SOFTIRQ_verbose+0x10/0x10 [ 1911.164950] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1911.165770] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1911.166498] ? do_vfs_ioctl+0x283/0x10d0 [ 1911.167060] ? selinux_inode_getsecctx+0x90/0x90 [ 1911.167709] ? generic_block_fiemap+0x60/0x60 [ 1911.168333] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1911.169037] ? ext4_fc_start_update+0xa2/0x2e0 [ 1911.169698] ext4_ioctl+0x46/0x90 [ 1911.170181] ? __ext4_ioctl+0x41c0/0x41c0 [ 1911.170756] __x64_sys_ioctl+0x19a/0x210 [ 1911.171334] do_syscall_64+0x33/0x40 [ 1911.171857] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1911.172567] RIP: 0033:0x7fe0be643b19 [ 1911.173080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1911.175639] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1911.176803] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1911.177797] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1911.178780] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1911.179756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1911.180741] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 09:31:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:31:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:31:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:31:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x20, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f00000002c0)='./file0/../file0/file0\x00', &(0x7f0000000380), 0x10000, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x2) 09:31:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5410, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:31:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 21) 09:31:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xca, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:31:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:31:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000400), 0x0, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x8) [ 1918.065526] FAULT_INJECTION: forcing a failure. [ 1918.065526] name failslab, interval 1, probability 0, space 0, times 0 [ 1918.067509] CPU: 1 PID: 9258 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1918.068466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1918.069646] Call Trace: [ 1918.070161] dump_stack+0x107/0x167 [ 1918.070745] should_fail.cold+0x5/0xa [ 1918.071311] ? ext4_find_extent+0xa3d/0xd30 [ 1918.071976] should_failslab+0x5/0x20 [ 1918.072638] __kmalloc+0x72/0x3f0 [ 1918.073164] ext4_find_extent+0xa3d/0xd30 [ 1918.073779] ext4_swap_extents+0x321/0x14c0 [ 1918.074396] ? __schedule+0x850/0x1e90 [ 1918.074957] ? ext4_get_es_cache+0x600/0x600 [ 1918.075589] ? down_write_nested+0xe4/0x160 [ 1918.076199] ? rwsem_down_write_slowpath+0xc00/0xc00 [ 1918.076923] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1918.077762] ext4_move_extents+0x1a4f/0x3270 [ 1918.078452] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1918.079204] ? lock_release+0x6b0/0x6b0 [ 1918.079798] ? __fget_files+0x296/0x480 [ 1918.080381] ? rcu_read_lock_any_held+0x75/0xa0 [ 1918.081047] __ext4_ioctl+0x304d/0x41c0 [ 1918.081630] ? __lock_acquire+0xbb1/0x5b00 [ 1918.082304] ? ext4_reset_inode_seed+0x450/0x450 [ 1918.082986] ? perf_trace_lock+0xac/0x490 [ 1918.083566] ? SOFTIRQ_verbose+0x10/0x10 [ 1918.084161] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1918.084965] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1918.085745] ? do_vfs_ioctl+0x283/0x10d0 [ 1918.086319] ? selinux_inode_getsecctx+0x90/0x90 [ 1918.086977] ? generic_block_fiemap+0x60/0x60 [ 1918.087611] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1918.088339] ? ext4_fc_start_update+0xa2/0x2e0 [ 1918.088990] ext4_ioctl+0x46/0x90 [ 1918.089497] ? __ext4_ioctl+0x41c0/0x41c0 [ 1918.090076] __x64_sys_ioctl+0x19a/0x210 [ 1918.090653] do_syscall_64+0x33/0x40 [ 1918.091185] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1918.091908] RIP: 0033:0x7fe0be643b19 [ 1918.092439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1918.095109] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1918.096195] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1918.097206] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1918.098281] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1918.099287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1918.100260] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 [ 1932.737410] kmemleak: 194 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:32:20 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5412, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:32:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:32:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x1f4, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:32:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) (fail_nth: 22) 09:32:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:32:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:32:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x50050, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:32:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x111000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:32:20 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5413, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:32:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:32:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 1949.271477] FAULT_INJECTION: forcing a failure. [ 1949.271477] name failslab, interval 1, probability 0, space 0, times 0 [ 1949.273236] CPU: 1 PID: 9283 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 1949.274389] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1949.275608] Call Trace: [ 1949.276052] dump_stack+0x107/0x167 [ 1949.276585] should_fail.cold+0x5/0xa [ 1949.277145] ? create_object.isra.0+0x3a/0xa20 [ 1949.277832] should_failslab+0x5/0x20 [ 1949.278380] kmem_cache_alloc+0x5b/0x360 [ 1949.278963] ? mark_held_locks+0x9e/0xe0 [ 1949.279550] create_object.isra.0+0x3a/0xa20 [ 1949.280194] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1949.280949] kmem_cache_alloc+0x159/0x360 [ 1949.281584] __es_insert_extent+0x3a9/0x12f0 [ 1949.282240] ? __es_tree_search.isra.0+0x1af/0x220 [ 1949.282975] __es_remove_extent+0x4a9/0x15d0 [ 1949.283626] ? __es_shrink+0x870/0x870 [ 1949.284199] ? lock_release+0x6b0/0x6b0 [ 1949.284780] ? ext4_es_remove_extent+0x205/0x3f0 [ 1949.285478] ? do_raw_write_lock+0x11a/0x280 [ 1949.286211] ? do_raw_read_unlock+0x70/0x70 [ 1949.286836] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1949.287637] ext4_es_remove_extent+0x1fa/0x3f0 [ 1949.288304] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1949.289033] ? lock_acquire+0x197/0x490 [ 1949.289646] ? ext4_move_extents+0x1a13/0x3270 [ 1949.290333] ext4_swap_extents+0x283/0x14c0 [ 1949.290983] ? ext4_get_es_cache+0x600/0x600 [ 1949.291611] ? down_write_nested+0xe4/0x160 [ 1949.292226] ? rwsem_down_write_slowpath+0xc00/0xc00 [ 1949.292951] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 1949.293825] ext4_move_extents+0x1a4f/0x3270 [ 1949.294497] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1949.295224] ? lock_release+0x6b0/0x6b0 [ 1949.295788] ? __fget_files+0x296/0x480 [ 1949.296360] ? rcu_read_lock_any_held+0x75/0xa0 [ 1949.297028] __ext4_ioctl+0x304d/0x41c0 [ 1949.297585] ? __lock_acquire+0xbb1/0x5b00 [ 1949.298203] ? ext4_reset_inode_seed+0x450/0x450 [ 1949.298865] ? perf_trace_lock+0xac/0x490 [ 1949.299425] ? SOFTIRQ_verbose+0x10/0x10 [ 1949.300025] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1949.300835] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1949.301619] ? do_vfs_ioctl+0x283/0x10d0 [ 1949.302182] ? selinux_inode_getsecctx+0x90/0x90 [ 1949.302823] ? generic_block_fiemap+0x60/0x60 [ 1949.303446] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1949.304131] ? ext4_fc_start_update+0xa2/0x2e0 [ 1949.304787] ext4_ioctl+0x46/0x90 [ 1949.305279] ? __ext4_ioctl+0x41c0/0x41c0 [ 1949.305886] __x64_sys_ioctl+0x19a/0x210 [ 1949.306432] do_syscall_64+0x33/0x40 [ 1949.306929] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1949.307625] RIP: 0033:0x7fe0be643b19 [ 1949.308145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1949.310873] RSP: 002b:00007fe0bbb98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1949.311966] RAX: ffffffffffffffda RBX: 00007fe0be757020 RCX: 00007fe0be643b19 [ 1949.312979] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 1949.314016] RBP: 00007fe0bbb981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1949.315033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1949.316054] R13: 00007ffeff2af37f R14: 00007fe0bbb98300 R15: 0000000000022000 09:32:20 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) getdents64(r1, &(0x7f0000000600)=""/97, 0x61) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000400)=""/255, 0xff, 0x40010101, &(0x7f0000000500)=@file={0x0, './file0/../file1\x00'}, 0x6e) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0/../file1\x00'}) recvfrom$unix(r2, &(0x7f0000000380)=""/44, 0x2c, 0x40002042, &(0x7f0000000580)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 09:32:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380), &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x112, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0x40, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1990.644838] kmemleak: 529 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:33:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:33:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5414, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:33:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0/file0\x00', 0x1, 0xa, &(0x7f0000000a00)=[{&(0x7f0000000400)="c36e0b48bb8514a71929895c6b7f999e4a3360cf595cf46e8bc958b04f94175182bc13be25d9dafe5e0b02bb50d9f48168af976a428a8e48759730485305a777b7d234bf4294b28d52af70ad9f362078f4fe23b946cc0de7f6fe8e9687bba49af6d088e10dba", 0x66, 0x2}, {&(0x7f00000006c0)="63075c7b5322feb53d6b04de60a2c6f3fd32f5b8adaf58fc0d7129ffb1ff1320b5f403", 0x23, 0xfffffffffffffffb}, {&(0x7f0000000480)="f0fdf658b5813df01fb0007482780c4f790d5155aea35080fea9e59ad42ea395d600305faecc76f72bb32ef4cec4cb7255e919d281107a01d396bcb372f5fad1392fc7c80827b24ca3ad61ad261273a6b6d1f1cfd8edce0dfb82956f2a56098e5ee01d301113d05f1f5cabda872cf19888571d14b4054d6b56cde025cd681c3b69252648899687562da9cc6f4f078b1390ae6020b56cca99078b44125d380956d74c2bb3164d7405392fa41bc0c90c3498cbbd1eba379fa7d212ab8b51eeed1f50fdf79778ea", 0xc6, 0x6}, {&(0x7f0000000580)="e14a6a3a75c6efc0fea1a1bf239b7333cb457d26e4daca03960d05949614d249c755c8216a3f7cf2b275289048", 0x2d, 0x80000000}, {&(0x7f00000005c0)="210062dd2505a6f09c5f9ba87f691af77cfed058fd798dbcfddb9114a30b014ab74df1d3e96cd55e23ac5e4d41ff67f1bf74a925c49daf6774494607f55994d7b92a5629323f13fa801a0c7d2b76b7d80d517e599266ea298a4ba393286e67d094f0c35395d8dda37d53ead3bcdc3f06bd95f42c1367fefedd3bf68a300001995ca84bfaaf38e0c7004024ebc48c61646e0079c40ee8f611da87788a2307ebfb2fee4fa64370b567015e36d0f73453e75ff8c79ad6e1c869b99f0b1eac922edabf5c0f9e6215de5a671065960749d95a6217128894e00afc06032250d63492261683d8", 0xe3, 0x1}, {&(0x7f00000006c0), 0x0, 0x8}, {&(0x7f0000000700)="1775b42b00575cd80fca6052b392819a292cfac40729ee634caaf68c02825820dbd123296037696d839f7df8b17e37a36a4ece026ecab8569e9269177c6d1b554d4f3c8fd4136017622ba2a22ee4bda69fde714c076481ba6f06a759a8f86e1f591656f24fce9109d36d296d108d8f8f6e7843665fac0357f30c35bfbd7e374044513fbd7877acf680aabd0c9eb5890bec57c795f3cca20669df1a1ad41b6d224cce45f49439f63bf524f453296c95b3c568bb49a437ecfa1f41f4f8bad31cbc5da2c60524915867c42ed85184f972c926b9338da3f0e590a3a603b0428ec5a97af430f60328cf2da1002c6f21e3f89e68b53dad7a4b0d8f", 0xf8, 0x1f}, {&(0x7f0000000800)="58afa2e53ef95664a0f0b5dcb77917fd51a55947c120690da8961d716eca2041fc3fa6505818dc839da8ee247b6da2ce85ffd0d18e18b3d8be1543e7727dd84429726a76a195fed3c57744e17f04285ae1e550611edab6e08496e11e209632cf2f2659a6b823d9018b5b8a7ba85a4c445f", 0x71, 0x1}, {&(0x7f0000000880)="3c8820e90e5de78ce705ff643a3d17fbfe0e7f770a6f0b29b0279de124d5f9377f11aecc135fafd089062e0a3c12a9fcc373f2d4ff7196558ce14074ae4674666cdbcc607aeaef452b52e5d4efdb80238da8c48dab976f5235806983777b2c24a16ede0f19ed9edd8db7316adee76fc1a3a89d0cebd9c059b2d5f7f6444dbbf12d6190de225dbdad51", 0x89, 0x7}, {&(0x7f0000000940)="3ecc80c5a12b2991e20d16a44474ca4e98f4d814d57e13eedf1a0e12e6cc3f16a0d670ddcd7e698356da9a0d61beaee4cc7702513b8df536ae90fcd6d4b068890c503b5a6a4acefca3fd532cc3af5ea25def176f85781c9e0f0de6a8bef6ea8040d64a749fbac05fcaf32d83951c6f84f8185e0dd3c9351e67891d7df71bedda0634399e21b1c8355bea74c91d90dca965168aed925fbc5a663ffbb0413b3825d9213f9389bafe8d42d50e938cf782b0a41c", 0xb2, 0x3ff}], 0x40000, &(0x7f0000000bc0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x2d]}}, {@huge_never}, {@huge_never}, {@huge_within_size}, {@huge_within_size}, {@gid={'gid', 0x3d, 0xee00}}, {@huge_always}, {@gid={'gid', 0x3d, 0xee00}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '--,'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@audit}, {@smackfsfloor={'smackfsfloor', 0x3d, 'tmpfs\x00'}}]}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:33:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:33:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:33:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x240, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:33:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:33:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000380)='./file0/../file0/file0\x00', 0x8000, 0x2, &(0x7f0000000540)=[{&(0x7f0000000400)="5feb321cefc00afa5d7a85b63939428c8a16fb50931bac6828c4dff8cb2401dadd0a1792f067db5d6fcd435deb37e74f9d5ac877325691094f82", 0x3a, 0x100}, {&(0x7f0000000440)="280fe0b64c8567f7ca6ad8c64fbdfbb5067221f4b23739281192c674258d50f4592ad63a2634cac23849aa1e9a68411250fe11e79a76f9e89a1887cda66769f5b21158cce702f425721c27dc304dec9fa9546b05bf28b5cd86589c59a2b1fd75c1e2b70e44f9d79f2697234c6987e81e5f84866f7ec54ab38ccadfa23cd615f4c2b8e176ae5756cd1ee5c7cec995aa9c4aa1c6380148ae8480d027747674d3f852d7cc5450d9951c944404b511782123cc3f922298ef7732ac2b4b138875571040aa11fd7e439b5e", 0xc8}], 0x200002, &(0x7f0000000580)={[{@debug}, {@grpjquota_path={'grpjquota', 0x3d, './file0/../file0'}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xffffffffffff6114}}], [{@appraise}, {@euid_eq}, {@uid_lt={'uid<', 0xee00}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r0, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') process_vm_writev(0xffffffffffffffff, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/19, 0x13}, {&(0x7f0000000b00)=""/53, 0x35}, {&(0x7f0000001ac0)=""/173, 0xad}, {&(0x7f0000000b40)=""/15, 0xf}], 0x4, &(0x7f0000001c00)=[{&(0x7f0000001b80)=""/71, 0x47}], 0x1, 0x0) readv(r1, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) sendmmsg(r0, &(0x7f00000017c0)=[{{&(0x7f0000000680)=@qipcrtr={0x2a, 0x2, 0xfffffffe}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000700)="70e09fcedea63d154f5b518be837581e764356b9b145aa57f050e60bb18d84b8c47ba70b3daf8919cfea09142a6106afcb2de18524b5cf1fb0c45713dd392b52522b6441bd9d63e4aeab187408a2d511113914", 0x53}, {&(0x7f0000000780)="e39334b57005b68cf67c8126a627f6fb779347a0282d689dc5174062362258945ba8225fd0100c3a84653f70db6d1a71e60a5789986f35050720c58bcaa94066eacda01a56b5910cfd2a30757fcff25d48298d66695f0786b46f2da3d350bc91c291719f263e278dd8b53ba7c89d11b333ea63c195c2e7727282824e4245c694e08338253fc675e4d54d2863cbc7c0e15bd5a035f16132df9a421fd359891e75c3c4724c3422eac5d5507a56088c8ed51eee54606cd70f6cd7db34e0d0b2994106884dab4fadce", 0xc7}], 0x2}}, {{&(0x7f00000008c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)="cd6d5c6cead9fca411ab3d258ccb6ce9719dc7dfc2b616e63056609f50c594fad06cfb4ded7b06d364658deb8bbc26088c31", 0x32}, {&(0x7f0000000980)="1795d3ca51e335183d26f47e60d601be393264e948e1ceafac7090a55517dd47d47927b0946db88023ef0dec43dae5081a695e5709d10f395b05c75fbbe60e94801827438b8092c6f8a1ff160fe99edc4229fdc7df44bd0cb6bea8ae097226838fa879798a171677c519c3ca897109311d6ff87903944deb0cf0302256bd7b3d9e74b5b7bee8251cd09bd966abd2b728f6f5a4acac0f602b345b78e4a1f68c50d455c935e14a00b886eee6bd8d1ce2", 0xaf}, {&(0x7f0000000a40)="5772f84758151bd237756ce0", 0xc}], 0x3, &(0x7f0000001900)=ANY=[@ANYBLOB="680000000000000002010000ffff0000c3a888ea62736a2b6169e58dffb1bb906ebd514e2e2aa6c2339a5318d8d4fc657731ea34a5ff629eefca79f28176b5ceedc4f041ebe67332433328a10b825a171a535acd8dd829830329df6f2d76da8a12648577000000007000000000000000190100000500000099b98078e4f7a0a70935b822879fd4b364ff2013105a6c95c399c66f731e0ab0e0d4c3895d2d91523b8b7b4775592d576f1cc5769558c450a4eed53f349ffd5ed1db710feb9bcf0ab09be3ab7120e87994da96ab8e975ddfd3e70000000000005266d718f18cca747e350f6563bc813f6aad1bc87f891d4dd3fbd21fb50502e5c188fbbcbcbfdf24e2508430917fc35ef8502e71ef3cdae7acc5442788712a715cb744306a8ae1978121fc5974196a1a7e9cde0dda5154a6ddb621a55fb1d185e09bdc031c61d3b9bb888be4dde3ffe6a49ac5786688f1cbb1ee98a384c91206e4906f7c77b733258a6e46c84878f29851de9f36e1fd8b6be0f3b442c7ddeba87d5a678062efbd2d92d834"], 0xd8}}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="c8928bc3835e63ff7f60fe4e10ea71b5301c3ddeb552266b237c9e6da855c1c1e244a97d40c002f99d869ddcc349f88e0cfcb4aaba8f41b3201009fb8bff7f93cc375352a4b795d988899a48b974d1de1108c9a77ed613c53f32ec43c5bb2e35a21dc34e58936d018430e0a85e188a25081f503d063aaefc08", 0x79}], 0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="e0000000000000000401000000100000b726cb843ab0eeb6d208e6c6b76c5858082d5b17822fa2fae436f6fc3d811b0e59491a135cc4b2edf76098422ffaded0fd69d509e71c9aa520604d0d8e162ed0fa5084512b9a2696e1fbc093849c4dabb7461e84afc7bdad9886bd84eca42fa3b4e9b9b9e465c3809f1e5463cf612dd4bc6ebf9ec5f8f5b4e8a5f7566138bdc335afa020439d85a78bfff2c447b1e988c51abb1a20de50ee4b6839ab2367fd70ca546a2d0ce9397b84b49c14a2dc0dc2187e05e6c82a88bbb6b45df5077c30a2ea8ab30000000000"], 0xe0}}, {{&(0x7f0000000d80)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @loopback}, 0x3, 0x2}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000e00)="f00547", 0x3}, {&(0x7f0000000e40)="6e7c4fc4c4b5a75b09ee93228665d100734d8f90fd63d9afa6564177241af7b31c248344e04d7085b9f0b9bbbf66686d0f82a2193b29b10b6a02e5fd5f97f7ba92386394e150ca06d80619f2f8f4a70ffedd5dbd5001dba83ff343884cfea655b95b1861cc34fdbf47c30f99b85b015ca9f3f2f0765ada6340a98e1cb8468f267d4d604204", 0x85}, {&(0x7f0000000f00)="a6344246127f5dddb864e24097604fd5bcbb2c2aee30e4829e8124678693d9939612975cfedc5f12277837a784617e45cc51fa188cfac139a069bbee8870bb02c93c2311560161f0eeaf650d3d18543698370dfa1cbf7220df4e2deed2700bde", 0x60}, {&(0x7f0000000f80)="f03a7c5ab4636053cca5a795fbc07ee50b1f95ca3464d06b53d1b0c7f2a119fd5f2e5f2b8a05d4b6f22cfb960d073a9377bb0b38667da66e4210b8486b32fac059ed73617862025c9dd1bec5d8aa2a672e6e8c43eb3195ba47393289811ee2685f343e9a9ef09512f5711c66e8473eeb0da1748801d73c3c4d16e337bfc79f7026a929d447b05d136af089d4b6e981b385d1d0a997b2fa302ffae4393f7f0924fb1eb3a08304276a3c45b51e97550c567dfec87895cdc83bd87dde68335f3db3d8ba8f76523072cf355ecf3364054fd6aa5c743b9123c6040d83bd479c4a61", 0xdf}, {&(0x7f0000001080)="f972a7f8b14d6099284e7e474d9e518f5440e0a3b0c44b4cd3ffcb8d1604ed2c03808a2be1a43d7634674d29df19ee74af6f38be7c2a33c51f6052961517a8d2951fd5cb96c0d224d9fb0567402a237531d2b7f43fe8e6fdf2cf652a2fb084f443ee3df7dc2505fa2d444c1254752534fa048a2bae830a56dc4d0d4fe70b1c3cb69b6e53d04c5b48a22443850fe7afba64c3091b405ad7ab197870d6db6171737374fb4f67cc3ab0f092dd1608179441a1ddf06c33a1f4b7600f8ea7a33d72eb3a3db91955136c58abf0a34165078492166e33bc68bb4b8d10bcf79d6ffe4e71a5d776", 0xe3}, {&(0x7f0000001180)="8cd95986a727a3c600d661e52fad48d39c6a5c8f7a2715e88f055ed1e48416b77b675e208845d97e0e247320eff559f352e37288f4b28994b1d0ec31f94585f05bab9ba9bc86b941f21e11861f0c4f492ad14fc8fe60c03b18cad3c297b1f624ae9444642da4902da4a293cfc03f87844843dfdcc4418b518025d622c166594d26fe5228679c", 0x86}], 0x6, &(0x7f00000012c0)=[{0x18, 0x113, 0x1, "0cddc4f145af"}, {0x100, 0x29, 0x7, "d70d8b35f22ab106eb003ebf241e0b0f94c65d826f160fe6eec9ded13387d2412680ab6a531d7cabd9f2a1bea9dcf2f85cc5d7d6620507a2193ff3c9d072b37d39bab80fd2abff2f256e4ed49d4d9ee22c0f86a9c43bc22db45fc9cf5e2d68f4f80435897da0c3f9a7afb2ae789d6f10184d4798c96f29aaa8968cc1b3c4253f1379fcdb9aba5faff584dfb445b15fa09d9f926ad49dc1c5f625175f953808010ade01080692794982ffc2815e6e3914cf09f93a92fc829464b691db85a8fa04b4cd4d366b988c0564e55eb603a86bdce0af8ff96e119e153bc7718de71e70915e2312e0dce0d565b7c671"}], 0x118}}, {{&(0x7f0000001400)=@can, 0x80, &(0x7f0000001580)=[{&(0x7f0000001480)="90af2f62412cdd5435bcdde0ba5f11c76de414b24047123e6e23a3ddc5c0d0dcb796fe9248f80715fc0687a6e447e29ee208c6b73179a1a650b05cef47616be8d1cec6c4a40a36456e194dfc96000c2c45ed76d3274e008a89a1c42b0e629a9d793f9b30e5efc325b11f6d597f9f8636d09f23a60946e164cfdf97faf01338f5f7177fe9288d02ee2f565f2d0b10069a15ca2eb56a2435cdba1d3a4d85f49c680fdaf3219e5d5044df059aee66b32ff8b38dd2ab2349c4f9a84e0057773851bff429490d37c7c0bcf7acbf3a685d68c412ff6478ef04897fdce236c570f65deae9fc15316b078c6526880d079284be0531", 0xf1}], 0x1, &(0x7f00000015c0)=[{0x10, 0x11, 0x84}, {0xd0, 0x0, 0x7, "a46fc093436857e4fee0f9593390f4dbb4f6f7f6aa8e21a9796409c34684ac40e2fe514780598f901b3e1b47d528d4cc57875808cbbb69a3053c56ecb683a2094388d92933afc63874f599be3aab16130a605ffc9e25ae7417c4689e8513260e16be94efdc144e9adc3864b93cf5848983348e8368668e4f15a1d2aa784a6d620f3933b4779ced2a96b5c15bdb21eac7c605b96435ad2a468ede9aa069e75eef86caefe54cb5190bb6e47740bf808a60ca88c9d5b194688ec282"}, {0xf0, 0x29, 0x1ee, "0172a3a2e67c47e00e048f762f641206fe51d3b2289e2e17027bb77df0251febe2c99d41c7910ca52bf7905dabc8577be31c91b69de7cc9bd8881ab2380bf74f06217daad0c06505acb4de02bc16d8cc0d75d965a1543745c229eb618f82b0f307073067b12f23655ccfdc6d62e595945702a8263ab86787f7de376438dd3172301530e1efe7b4a15888e4ae30faf9a156e8a358daeb17ff4cd0e740195bb0ed1c592c76a9e698519431b99c59afadf00631dbcaadb1430b81900bda73cb4a047058db5903241af1be126b287b16e285bef95d796566116658e11302506441da"}], 0x1d0}}], 0x5, 0x20008000) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:33:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5415, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:33:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:33:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 1999.319420] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:33:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) getdents(r0, &(0x7f0000000400)=""/218, 0xda) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1999.401694] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:33:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5416, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:33:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x20) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount(&(0x7f0000000000)=@sg0, &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='proc\x00', 0x19000, &(0x7f0000000440)='\xb4$/-{?.\x00') mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@remote, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000c40)=0xe8) syz_mount_image$tmpfs(&(0x7f00000008c0), &(0x7f0000000900)='./file0\x00', 0x2, 0x2, &(0x7f0000000ac0)=[{&(0x7f0000000940)="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", 0xfb, 0x6}, {&(0x7f0000000a40)="02e0ddd0bae3569703d4bbc85a95b7def26ab998f52e1881ac0c9299c52459afc620ce39f433f9a8bb7b6b21adca49a490d5653e2f484db10154f1bc898984fe7a13ba4c8299d44e98d9f4e27cc6fcfcfe", 0x51}], 0x2000809, &(0x7f0000000c80)={[{@huge_within_size}, {@uid={'uid', 0x3d, r0}}, {@huge_advise}], [{@euid_eq={'euid', 0x3d, r1}}]}) readv(0xffffffffffffffff, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x20, 0x4e22, 0xc0, 0xa, 0xa0, 0x20, 0x80, 0x0, r1}, {0x5, 0xff, 0x7, 0x3, 0x3, 0x6, 0xfff, 0x6}, {0x9, 0x80000000, 0xfffffffffffff000, 0xfffffffffffffffd}, 0x6, 0x6e6bb8, 0x1dc6956679c34bf2, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x24}, 0x4d5, 0x32}, 0x2, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x3507, 0x0, 0x1, 0x5, 0x1f, 0x5, 0x2}}, 0xe8) mknodat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x200, 0x8) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) recvmmsg(r2, &(0x7f0000000840)=[{{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000540)=""/172, 0xac}, {&(0x7f0000000600)=""/90, 0x5a}, {&(0x7f0000000680)=""/130, 0x82}], 0x3, &(0x7f0000000780)=""/142, 0x8e}}], 0x1, 0x40000000, &(0x7f0000000880)={0x77359400}) 09:33:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:33:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:33:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) [ 2051.153485] kmemleak: 933 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:34:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x2, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:34:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:34:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:34:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x300, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:34:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:34:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x22406, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/../file0\x00') ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0, {0x4, 0x7}}, './file0/file0\x00'}) pivot_root(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000480)='./file0\x00') umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:34:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:34:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5418, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:34:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$ext4(&(0x7f00000007c0)='ext3\x00', &(0x7f0000000800)='./file0/../file0\x00', 0x8, 0x0, &(0x7f0000000840), 0x2080008, &(0x7f0000000880)=ANY=[@ANYBLOB="757365725f78617474722c6a6f75726e616c5f636865636b73756d2c6d696e697864662c7573726a71756f74613d2c6a6f75726e616c5f636865636b73756d2c646f6e745f6d6561737572652c736d61636b6673726f6f743d6e667334002c66736e616d653d94405b2c736d61636b6673666c6f6f723d2c66736d616769633d307830303030303063342c000000000000000000"]) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$nfs4(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x20, 0x7, &(0x7f0000000680)=[{&(0x7f0000000400)="7597bb1e375aab96aaf3abf04a1cab1cfaf6f2a7c660155e1b64a221a9f80af1bab99e40b7a11a8bf81bbcbcbb3f5f29bc892db49b7cc7b666f80e0b2e97c4458f622a69f20cdf794140556ab0c3fab8d696406d88f6ecceee41ce9bd8c370b2d0158de82ed41db62aa57be7907920f347f563fdd32de711b6e1", 0x7a, 0x5}, {&(0x7f0000000380)="63b36fdf1b177661e6afbbb2e205e7", 0xf, 0x6}, {&(0x7f0000000480)="61f42071826bc431ec52b0be4cc06ba92328d1da6705f992bf257b328453d79ce66739138fb65c04d862d0ac34aa43230f98808e10a11abb4307874756c2e3", 0x3f, 0x4f}, {&(0x7f00000004c0)="43064a9d34c2ea2707f069acf36a27a14dfc8a5588527a3c74083da469873b1538a8435297387ea5454a556c832f37786670ab454c1a0e2f5cff3300fc2ba487f5eaf69aeffbf324c5bdbec29138197d820e59c8ac265f5f1175795c93072fdf1aea1b5421e11e11e326eaf026693c6a8d7baecab4877004fb671b478aa34fe4ac800cf22ae251137dab98a7e425c655cf6f2b7ccde4df1559ef4f7f9c262303daf1d537390b", 0xa6, 0x8}, {&(0x7f0000000580)="dfb8d59af6bc0e31a0ee22cf90437689a60cd20f3fcba4e02adf4685318278bde8ad891dc81341b145a19b171ffeb388", 0x30, 0x5}, {&(0x7f00000005c0)="552f51e48137b615d20c70d612fff06f539ddb30a25278660f9b9e8e90662df0", 0x20, 0x9}, {&(0x7f0000000600)="bc5b9ce24904ccd2a1856669e6d340ea8f966c3cae3ff2c9acc1455272b4e4ee57f48386de8c3106f69f75fb5c34a5f966a81c1681525c1b1fa15762f192434841a300438140b011a2e0d28d193ed9bc51d55d0702", 0x55, 0x6}], 0x80000, &(0x7f0000000740)={[{}, {'tmpfs\x00'}, {'tmpfs\x00'}], [{@uid_eq={'uid', 0x3d, r0}}, {@dont_measure}, {@dont_appraise}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}, {@subj_type={'subj_type', 0x3d, '{#'}}, {@dont_hash}]}) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:34:10 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541b, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:34:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:34:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x4000801) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:34:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:34:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x3e8, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:34:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) creat(&(0x7f0000000280)='./file0/file0\x00', 0x15) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:34:15 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541d, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:34:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4b47, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) [ 2092.189115] kmemleak: 114 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:34:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:34:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:34:51 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:34:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xa00, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:34:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541e, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:34:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380), 0x1004048, &(0x7f0000000400)={'trans=unix,', {[{@access_uid={'access', 0x3d, 0xee01}}, {@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@version_u}], [{@obj_user={'obj_user', 0x3d, '.-+'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) 09:34:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4b49, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:34:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:34:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541e, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:34:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$bind(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000400), 0xa1000, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:34:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:34:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2100.889960] 9pnet: p9_fd_create_unix (9444): problem connecting socket: ./file0: -111 09:34:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x6, &(0x7f0000001740)=[{&(0x7f0000000400)="c57c024282d0d12990aad0f3204ae5cf3dd6934f701531f71f468d5b8d80dca050e9ef016e287e2218a3cbbc33314c7022be070f714ed4e0956e98200fe5fe6a39bb22c853cfd32774a63850d6714ee7ef55a1bef76fc254cdc901fe74e586acfcc8a23ebe7fc65539023111", 0x6c, 0x200}, {&(0x7f0000000480)="d9b4d50a50aff7ebb23649d8d7578ad986a19e2a6577df1db969bf48b79b7529c315d80514e972c8fdf2b0836fe84964d17988fa58b81a149667243b2946b2e25d5b1d191593b7b4a3f87619b93d5707f23e0b6f64de02ce6ffc2738791b64e88e472acac8fcd9c9b9a5d3c77a498b8abeced538447203cc7903ceadafd65723a7272b7a92be3dcff59bd44f0afc359da5cea48caf1a805759c8df34b12d8fedf91e3f1dfb704982d7342a2f169cda7f66d33d2d6b81d5afe13630e9324ea2e449868720e4de93ef28b4261e1c5aba03ffca81194d11fbc28280d764f8ec6ebdec", 0xe1, 0x2}, {&(0x7f0000000580)="6afae744ec6c34fb8f4890a18a8ea1c1b832f22fc31f0ff8897d5919858fd2a14b62198ea055f1b32eed2e6a4f1cfea4571b38c25d5ec68e96fd6c083c2483f4e726a24f5774f975ac18f3728600a16b3200f80b8a3e76231b67db4345893eae0f9140ff1fa193e935f8ab2e2f0bfdcc033804e6699d821ac47e258f6974f3e0adf317f1f6ae9786d513e4186c11dfae8fbbbb0ba4388fc05599ea08163baba11f6f6f5d38bd42df7bb2e1ea0f", 0xad, 0x2}, {&(0x7f0000000640)="3633c83e748a8443457cb50b06eb4aa0e2409e37443720bfc8aa6b91541dbc106c8c6edd1e0a3277ae080b849e4c84ec6386bba9d18238461a8ecc937a1183746efd34065ddd0712b53c83f411ef4654663b6f3f8e16b2131a617944923a38bdd83bdd4a2d8768d62ee51b229d5883dc1ec5", 0x72, 0x7}, {&(0x7f00000006c0)="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", 0x1000, 0x1000}, {&(0x7f00000016c0)="b5d99c45f391f47b8eb97d7944e28bd644d709b2e616416c187755822ea12bbf83b910ea7100919889f5fb09dfda42dda7e13f8298d06b0ac9e815d8f7228fd319128a48bdcf07", 0x47, 0x1}], 0x1384000, &(0x7f0000001980)=ANY=[@ANYBLOB="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"]) statfs(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000018c0)=""/52) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:34:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:34:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xe00, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:34:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x541b, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:34:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5421, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:34:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:34:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2119.183197] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:35:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) openat(r0, &(0x7f0000000280)='./file0/file0\x00', 0x80000, 0x81) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f00000002c0)='./file0\x00', 0x100) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:35:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400), 0x20000, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:35:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:35:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5421, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:35:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:35:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:35:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xf00, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:35:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5422, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:35:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x17810, 0x0) 09:35:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5423, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:35:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:35:19 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) fstatfs(r0, &(0x7f00000000c0)=""/27) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/28, 0x1c) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:35:19 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x5, 0x80000001) accept(r2, 0x0, &(0x7f0000000400)) getdents(r1, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x140048, &(0x7f0000000380)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r0, @ANYRESDEC=r3]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x40400, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:35:19 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5424, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:35:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x17810, 0x0) 09:35:19 executing program 6: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:35:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f00000002c0)='./file0/file0\x00', 0x100000001, 0x6, &(0x7f0000000700)=[{&(0x7f0000000400)="580079a839e6eb11840105f880ab827f4c16a2e437d48fe2cfde8b16ed12e6acbad17dbafdae3e0398d74d8f8409d4318fe170b7af2e0aba0452464bc2edfeadd1b7fd66f3cb7cc04b8dbec95a7bbc491da70f3a40bc27fd2777", 0x5a, 0x7fff}, {&(0x7f0000000480)="a66417437dc919133a6f19c002845c51924903ceb4732732c084ccd8bfad19f30b55c5b9f2c85a8cea23eff05f221852ea3a6b0e45d29fa420d1eeb1647e40e14ca86263228c17b062c99a4828567e264546765486443134828cf99d7b0167c79fad13c2610d6d2a853b3e0ceb20d6e0a7bed20298cf182edffdc87a7a12fc051d95737bc72c745bf7228b88cadb3446e4763f01bc2877d28fa2ca511ba248ce4a640a89b668b8498c0db53ffe431c9acec83aedc572e30e65a693e66d627dc4835937b9a2df15befd4ebe8cf85085e45e77e89d13a1d85741c61328f59677224cce907070c0c672fc056e06f765c68776", 0xf1, 0x8f1}, {&(0x7f0000000380)="82fe32a8ff010e94902efa5c1f0d281ec8", 0x11, 0x9484b5b}, {&(0x7f0000000580), 0x0, 0xd611}, {&(0x7f00000005c0)="724f7477298440c49344f0", 0xb, 0xa124}, {&(0x7f0000000600)="8dee2432c0a474bdc6522966853dedd24a00148a554055080f4b58e82e184d9e8568643dac7a6b50aeeea223ab364d9db7d411d6b42574e186a3a57de3eba00c1dd6f93994f113159e723f067198fd3b40261ad6b36b0c104546e129d5208d5f559e8b7616fe7c5c73642f2880dcda7c7b636196a025a56a106d04846a52cca5ce52a8ae15e652a4aed0883c97c890aed83aabe4c0ecb942425ad7628b338b762652a6db12ddf5e83343529c3ea2facc4f43f2add37c6b8e77433428ea33442fb5", 0xc1, 0x7d0f}], 0x20041, &(0x7f00000007c0)={[{@grpquota}, {@journal_checksum}, {}, {@norecovery}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x9}}], [{@measure}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}]}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:35:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5450, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:35:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:35:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:35:19 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5425, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2143.263940] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:35:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x17810, 0x0) 09:35:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x1100, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:35:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:35:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5451, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:35:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5427, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:35:42 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r1, 0x0, 0x0) name_to_handle_at(r1, &(0x7f0000000640)='./file1\x00', &(0x7f0000000680)=@GFS2_SMALL_FH_SIZE={0x10, 0x4, {0x6, 0x8, 0x89, 0xfffffffe}}, &(0x7f00000006c0), 0x1400) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x189006, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000400)={{0x0, 0x1}, 0x100, './file0/../file0\x00'}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) chroot(&(0x7f0000000540)='./file1\x00') r2 = openat2(r0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x343001, 0x8}, 0x18) r3 = pidfd_getfd(r2, r0, 0x0) accept$unix(r3, &(0x7f0000000580), &(0x7f0000000600)=0x6e) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) mknodat$null(r4, &(0x7f0000000700)='./file1\x00', 0xc000, 0x103) mknodat$null(r2, &(0x7f0000000380)='./file1\x00', 0xc000, 0x103) 09:35:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x1040c00, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:35:42 executing program 6: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:35:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x0, 0x0) 09:35:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5428, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:35:42 executing program 6: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:35:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f00000002c0)=@md0, &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='logfs\x00', 0x209000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:35:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000040)='./file0/../file0\x00', 0x0) 09:35:43 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5429, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:35:43 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:35:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x0, 0x0) 09:35:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5452, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:36:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5460, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:36:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000380)='./file0/file0\x00', 0x524a, 0x1, &(0x7f0000000500)=[{&(0x7f0000000400)="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", 0xfc, 0x5}], 0x800400, &(0x7f0000000680)={[{@mblk_io_submit}, {@prjquota}, {@grpquota}, {@orlov}, {@dax}, {@jqfmt_vfsold}], [{@pcr={'pcr', 0x3d, 0x37}}, {@euid_gt}, {@uid_gt={'uid>', r0}}, {@hash}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@smackfsroot={'smackfsroot', 0x3d, 'tmpfs\x00'}}, {@uid_lt={'uid<', 0xee01}}]}) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:36:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:36:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5437, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:36:00 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:36:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:36:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x0, 0x0) 09:36:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x2700, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) [ 2169.025464] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:36:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5441, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:36:00 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2169.102003] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:36:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000380)='./file0/file0\x00', 0x4, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000400)="e60367fc61c45a796fd62cf3a41624d0e6ad9f2baa1db6baed561bb4b2998d08ffcf9223abfea93c6ac4f9089ced9c50ef82767e7ec274e49a882770174d0554204ed9f1f5f456285e61a4c9991b9445d4319307e16e3056a172c4fdcb7eeca200ef1f2f46397cffe2c0fabce20825499872fd522464009b0ab77acea169b1df470431bc17b084dea17f448d1245d3adf57e27d4d13796b7666df60c0270d6fd5535cdaf291eafeb811b1e625d39e2877f254d3d7824", 0xb6, 0x61e}, {&(0x7f00000004c0)="b379bef26f3f2d4707ded49cac85aa7503d25a14101052ae8811b78a73abf0288ce86c0a8b49f0a8c26f8a05df8f3a347d4a432ee3e0fe30619edad7ad8e00334d352987a2495f02ebd93790108237ad2aacd9ac324bd02ae04d1a82e8807d25c3cd28e8d6ba9e139baeb5f6073b8f18d50c940879d3a0854cef7269ca775adcb19d72fa0df2ee3078aff62f29d9634f1021d2086f7b534a80e39775d4852c7feba66b47a2a48a219d246cf799c290fd463b3f026f0393174e2f6e7bbad83757f1d5eee6328c60d805cc185ea03796057ecd808f947eda1baa1bfac8d3042e48bd85411d4447ee177e8b19149f55cb9ada7022", 0xf3, 0x8}], 0x40000, &(0x7f0000000600)={[{@fat=@nfs}], [{@context={'context', 0x3d, 'staff_u'}}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:36:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:36:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x1400a, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0/../file0\x00', 0x5, 0x4, &(0x7f0000001580)=[{&(0x7f0000000400)="02584946e755ccb69ef3de65dc9b21cba998f9eb61e50a3efcd74ae839a1a7e5ca07b2ddeadca4a3c4626be153f977b53e4f711ae9ccf05e855f8b473b83fce18671ca435f1148df055df3267e2a2f9bae5cded56ad1f3e8b8509c353642f4945c0084", 0x63, 0x9}, {&(0x7f0000000380)="3539c1350610c53dc742026f07ea34f5e5ff2c08276c61cf3b024029f6496f50d601", 0x22, 0x2}, {&(0x7f0000000480)="721313d4d5fed1954fe7419acd9d3ab18b03cc64f9a054fa247e952cc317333c173e180ecbe0aad4d9acb5fbbc50bd2db9302f9358f08329ba3cc5c18fc56d2c6d7ef59fa22089d294a7b8030e5dfc541261869d5e777bdf92e1138942b57b34e32bac35331cdd36d51c7fcb3258ed78f5e1d7b7f8c9ffabb6c4a99eac7280c7e0f460744834d9a61fde1745a0f1e93c9322042372f6b19eafdd735e711fd59dd2cfc7c141f05e82723ed39ea7292a394d7c786d88f1b4840b653dbe8d69edf4f289881a1f724cee8072d970c3cd178966c03890509759d0", 0xd8, 0x8}, {&(0x7f0000000580)="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", 0x1000}], 0x0, &(0x7f0000001600)={[{@shortname_win95}], [{@fowner_gt={'fowner>', 0xee01}}, {@appraise}, {@uid_gt={'uid>', r0}}, {@smackfsroot={'smackfsroot', 0x3d, '%]#,'}}, {@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}, {@fsname={'fsname', 0x3d, 'tmpfs\x00'}}]}) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:36:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:36:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5450, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2169.460161] tmpfs: Unknown parameter 'qC_H]&~*/\jP56B\' [ 2207.460985] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:36:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:36:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x4000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:36:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5451, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:36:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:36:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0\x00', 0x20) syz_mount_image$ext4(&(0x7f0000000480)='ext2\x00', &(0x7f00000004c0)='./file2\x00', 0x7, 0x3, &(0x7f0000000700)=[{&(0x7f0000000500)="ed424ea7466e3fcbc044f4246a92ea66caa2cbe2f2539ebd5e43f0766394afc415f051ab5e3e7fc8d41eaad4171457109669832f7a7be64e88bef53b86fbce663d8d9e03756314ad4a5fd1ca12c952e9f5393fcc16c6adec9be021cc204075aaafcfb357c7d7dd09", 0x68, 0x1}, {&(0x7f0000000580)="0933c9e10299d4f27e237d38dcf36bc5ee325d690ee54e2e9f4608a2c7f7058e45cbb1d2404ee610181292e283c35c1343f48a5b9aad56919171864baf409c8706b938b383d9a853829f187a2cffdd26c073eff8b8e6241e1ad1cfdeee9763693ed370ab82488db29bb94b4575bd74b34d6b409d69", 0x75, 0x100}, {&(0x7f0000000600)="7102a440160491936e50f478fd2a4539dd83b5f2f339ab15efee4ddafd07f56366d69ebd60ad7dca3fde613f6b6ac895a99b49d1dc95a15302e476b13fadf358f093bdce7212711d0e9bae5466dad0062ffbd47e47b4cb5a38da27f15ce6831a4e0581d81bc53aa73056c00b3341f7f3eabe8a64ee43b00c348d6926cfcab20f5108e7365db39be71e65e6d5ad387e736c779e65683d51db25b820c3bd1eede3b2b7640ba3c309ef5f7345873a07ed9eb0dd3cdab4552bdf62d3ad4d02df4d77408477eef0612f34fac15ba857ec18e2fe00", 0xd2, 0x3}], 0x100000, &(0x7f0000000780)={[{@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x79993645}}, {@usrquota}, {@noacl}, {@noauto_da_alloc}], [{@smackfsdef={'smackfsdef', 0x3d, '*.@]#'}}, {@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_lt}]}) r1 = creat(&(0x7f0000000280)='./file1\x00', 0x120) mknodat$loop(r1, &(0x7f00000002c0)='./file0/../file0\x00', 0xc000, 0x1) mount$bind(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='./file1\x00', &(0x7f0000000440), 0x1a43080, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) fallocate(r0, 0x11, 0xfc40, 0x4) 09:36:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2250815, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000380)='./file0/../file0\x00', 0x7ff, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000400)="53fb1226b17323e2fad889465d253eea46d4c947b049572e68bd82cfb5e45671e68718298db6184d5d9f771b099146c42bfd34bc91855b4a6bc08bd3f21166119f97ec5904904953771e34cdcaf5c221add63b8bf955122c8ad11565585e7878b8d81e9027ca90ccd95feb001940fedb48380a68562926d967536da8a670fa612c3c30aba58cb65357bf7584eba7397d4fe594e3674a0379518d228c759d90894389e5938bf7cc8afa9f69845dec9812328eb867ecdaaf2b36c43515d8155bd4f63e789cfd84b9e9954a00", 0xcb, 0x9}, {&(0x7f0000000500)="b3441159b779607a7aa6771c46ff69a719f2313a0fc90ab939b1da8f98850b13fa1e071b87653779672728aa50f6d07d4c377197e167291f57a28563ac239fefa797d02676f63c0fe899990bad4fa2d1487438d8d53f9a7348ccc05da6c5fcec66a764c13462908c82571a39f2e59e03aac3bcc4d39174f362d433f4fc404930a86f90b2bbf52c2450809df4d50f3b30bfbc091e19e05473a8cf036bf9262dafdf5a203fa0", 0xa5, 0xffffffffffffff81}, {&(0x7f00000005c0), 0x0, 0xfffffffffffffff7}, {&(0x7f0000000600)="61616097d7e8aa585c660a0ff59dd826602ef1d735281c14c4b91910e636a9e4982fc716963ab4f53a23a723893e07cafc0f6c18743ac781ad48919e44cb851a1df6c175b11a28ed55deb032", 0x4c, 0x7}, {&(0x7f0000000680)="4386869ca2f579b87359173cbb7ebec2958e9bd1197e466fbdcc147fec559a26672cc76a5b6ada8b35c054f977e851e1784426c0cd02c9f1a957fb6f50e1055482ad4cc5c59e2d5459cb5f1b9faaf14e782b7e4966242c852ecd14e04f2d9dece32a4a5762e111faaea4ab7151931f3c0d44d1955092a64ef1aa2f0079d64b", 0x7f}, {&(0x7f0000000700)="5659e2b494b5cdb66aaea5dcde1ce404786f05604d819dd7425db459dde0ae45d86d11388dfd3cd8fce24fe863b8ea816d93081e7e4684d8355371fee8884245b66b9b584815f75a2ef8e69a57d6f35050b36f2313c07afafd8825", 0x5b, 0x81}, {&(0x7f0000000780)="561766b5fd28ad164f83ff8c169fbac51e32d888c69d32701247651d01833de9575a46dfa9ca277c03d58136d8e10376d368c9de0a335f2517df5bfe11d2668a560f1f55d9f812ff3ff9f914d1c765e5eb8bbeadfd29f6d4191dfe469fc775624190b9504a6f300455796a79e33eae1045bf951951686bbf2ae7f180165dbf3e971f9988df777b7caf566a5dff18153609e2eab8ba47e65d3aa1139dc918e5d211581fd079d0e2269b5f3fe3f2268058aad0c5b6", 0xb4, 0x6891}, {&(0x7f0000000840)="db9fe8f5e6a303ba5a1fd9cc14ec3c2e459b1d8abf2f161c41cd02bb95442a58dcb0f239e7ad68486e3e32b8eab4471d564e753947daccedbca99206b20c59d18804683323ca01", 0x47, 0x200000000000}], 0x21000, &(0x7f0000000980)={[], [{@seclabel}, {@seclabel}, {@audit}, {@fsname={'fsname', 0x3d, '@+'}}, {@uid_lt={'uid<', r0}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:36:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:36:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6609, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:36:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5452, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:36:47 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x10a5058, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mknodat$loop(r0, &(0x7f00000002c0)='./file0/file0\x00', 0x8, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:36:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:36:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:36:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x545d, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:36:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:36:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:36:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x660c, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:36:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) openat(r0, &(0x7f0000000280)='./file0/file0\x00', 0x80000, 0x81) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f00000002c0)='./file0\x00', 0x100) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:37:02 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000640)={{'\x00', 0x3}, {0x4}, 0x85, 0x0, 0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000400)="b6f3c326c20ba8e6fb16040057ac8ade51892c30d03603abf1ebac17462e46bf151ed8880811da67e7390580824f92ca7d0d08e897b8ccc17440dfb8f9a4e9b118f5f1a9a7386d030dbea459041ab7f099d27619816bf18c4e6e8d6fce008decea3446a24828061104948f09e98e4a570734c95c54106e401368a7", 0x7b, 0x0, &(0x7f0000000480)={0x2, 0x12e, {0x0, 0xc, 0x42, "5dcdab012ec4de381cb6cee2ebd1369e78beb70b113afe8a3994869ea213b3697d2a8ab75f015edef7c6a91e9fcc5105311c74aa25d3ed76680cd01fa555afee1643", 0xdf, "89e105f334e200409a247f22ef27c98c7acbdb4d73a29f4928e8f2c8bd7cb84db32c1cd8d4e7c1867bc09ffba9cc3fd4afaadd7f37484281b71f021d0b195e540a016f2692c59ee2618961745471a38d4b86473b826fc8ed5525272265c1d22438e721a22b590a9e1eda7de491eaf9251f76163b9fdf51887e8d9ffc55bcb3f2f0a6e8659dc63c13f2ef33f010b6e34e68c3c418f1e551f805757afec0b9ca8d9f7ff5743e5821de5296d42091f93e30466cf8d942c8875cfbc2f56d9c07ae2f352661d726c5db823954941ce520d79b61a20a667224a36c93c90d1052cdea"}, 0x6e, "e4e74b8d19e1fdde268ba25ade59bfb2215c0735e4de8b1d9fcdcc57a8b5c33f69fda238fc3e3b41b655138c32237b1e7bf519fb1fc843316ceb6b9aad52f371f2718d4f4de79fb99ddbc1b9c786281b209d98d2b2ea06d2c8b908ed7a49bf4085f970245810717032454c4a047e"}, 0x1a8}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0/../file0\x00', 0x3, 0x3, &(0x7f00000018c0)=[{&(0x7f0000000740)="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", 0x1000, 0x1}, {&(0x7f0000001740)="d6c4cd2aa1da263a69d1b169b826c89a20b1912e932bcbc001497150766e61c289393172514a45e4628af1c2ef35a94a0e8bad73574d59c4cd7af4a2cd17bc509acac4b4dfc372b2ddd0771c2f13f2824b4def2023b160c6d416e37af05a64a6297ea88d09c1fb5fdfd317b864abe037d93ee091a5d71536299ca1aa8eeff7020bc92d9ca64518a44b5e7ff616eff7c0ad16a098ff61d425bcd92c", 0x9b, 0x4}, {&(0x7f0000001800)="d3c87aaab972afab20f91a20290b9715e8b74f718384288aba916a389d6c65869a9383b7d7d085862c397bdb9262b2038d0b84cef6efb895efab8c993ec8d3276c530227965380d99c4f1aa352e532e5ecc3f4fad44386610dbcfbdf2761e508e1e3dd9653528155e58cb5cf7b1bae144756a75bf29a040be2d182336f76e225a28febd9a33c95a401f5b985b96409a255beccb29beed065497abbdc656de549bcc5ab0a58", 0xa5, 0x1}], 0x1800, &(0x7f0000001940)={[{@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x31, 0x25, 0x65, 0x39, 0x78]}}, {@nr_blocks}, {@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@uid={'uid', 0x3d, r1}}, {@uid={'uid', 0x3d, 0xee01}}, {@huge_within_size}, {@huge_within_size}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@permit_directio}]}) umount2(&(0x7f0000000280)='./file0/../file0\x00', 0x8) 09:37:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x4002, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:37:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:37:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5460, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:37:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x22406, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/../file0\x00') ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0, {0x4, 0x7}}, './file0/file0\x00'}) pivot_root(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000480)='./file0\x00') umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:37:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0/file1\x00') r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x100000, &(0x7f0000000380)=ANY=[]) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/40, 0x28) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/../file0\x00', 0x100000) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000580), &(0x7f00000005c0)='./file0/../file0\x00', &(0x7f0000000600), 0x0, &(0x7f0000000640)={'trans=virtio,', {[{@privport}, {@access_user}, {@cachetag={'cachetag', 0x3d, 'tmpfs\x00'}}, {@afid={'afid', 0x3d, 0x800}}, {@loose}, {@noextend}, {@cache_mmap}, {@access_uid}], [{@uid_lt={'uid<', 0xee00}}]}}) readlinkat(r0, &(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000480)=""/87, 0x57) 09:37:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6611, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:37:02 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a, 0x4}) 09:37:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:37:02 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5600, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2231.188242] 9pnet_virtio: no channels available for device syz [ 2231.230732] 9pnet_virtio: no channels available for device syz 09:37:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) 09:37:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x4800, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:37:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6612, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:37:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:37:17 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x80, 0x10) symlinkat(&(0x7f0000000480)='./file1\x00', r1, &(0x7f0000000500)='./file0/file0\x00') mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) openat(r0, &(0x7f00000002c0)='./file0/file0\x00', 0x121000, 0x1) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f0000000380)='./file1\x00', &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440), 0x1000000, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:37:17 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5601, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:37:17 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 09:37:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 1) 09:37:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mount$9p_rdma(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532332c73713d3078303030303030303030303030303030352c73713d3078666666666666666666666666666666662c73713d3078303030303030303030303030303030342c76657273696f6e3d3970323030302e4c2c6163636573733d757365722c72713d3078303030303030303030303030303030372c6e6f657874656e642c6673757569643d34623765633838662d393964642d626233342d0a3363312d61323366066f37662c736d61636b6673666c6f6f723d7be52c66736e616d653d2c666f776e65723d", @ANYRESDEC, @ANYBLOB=',fowner<', @ANYRESDEC=r0, @ANYBLOB="2c617564698f2c6d2561737572652c00"]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) syz_mount_image$nfs(&(0x7f0000000540), &(0x7f0000000580)='./file0/../file0\x00', 0x3, 0x5, &(0x7f00000007c0)=[{&(0x7f00000005c0)="452752fb10dd2b8f204fcc83579e3717b6157d6a8aad0a6bccf1979e8289ddd44fdbcd6ef41e2ab4", 0x28, 0x5}, {&(0x7f0000000600)="4e55de3fa9fe62bc481542a58ea8cf1911b1e1138c3284e269777fe6d7e8d8a909b810c0c89bd4bde0a15239a0e3062f524dc46d96cbb5cfeaa1f192fe50453517342daf426143bdde462b6a37e1f7ba48cf253c4962", 0x56, 0x2}, {&(0x7f0000000680)="99b1a7402bcb3ca9692ebb78e36c1ff9a17cb10b6d3f27311da13ed3d8802f5bd011672cb2332a605ade0c7a42", 0x2d}, {&(0x7f00000006c0)="e0223b11307cc09049c5bc33cfdd4217bc2615566ba899f61c0dcd55ae1af26f7eca282e4b7b038f9bf70fc22d1360a2", 0x30, 0x6}, {&(0x7f0000000700)="b07ab7adee243633a81dad1e708532109a3ad72a563cd6d9985173a8247fed22a93cae50110c8edaedc1e17464e88581011a6afe0dc232b84686f3af897c20a4ec09d2b15fa5c4930462acdd771831691730ddee238b28d500f9281b31e16516a466747287ee350c93f7d6e22c247afe4681530dde4e91e300454a8a85a1483b5772017d95f864e7c41b52142d8aa1bdbdc5411e2c58", 0x96, 0x80000001}], 0x0, &(0x7f0000000840)={[{'tmpfs\x00'}], [{@dont_appraise}, {@smackfsfloor={'smackfsfloor', 0x3d, '127.0.0.1\x00'}}]}) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:37:17 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5602, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2246.785868] FAULT_INJECTION: forcing a failure. [ 2246.785868] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.787494] CPU: 1 PID: 9749 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2246.788415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2246.789658] Call Trace: [ 2246.790026] dump_stack+0x107/0x167 [ 2246.790526] should_fail.cold+0x5/0xa [ 2246.791120] should_failslab+0x5/0x20 [ 2246.791687] __kmalloc_track_caller+0x79/0x3c0 [ 2246.792403] ? strndup_user+0x74/0xe0 [ 2246.792983] memdup_user+0x22/0xd0 [ 2246.793467] strndup_user+0x74/0xe0 [ 2246.793999] __x64_sys_mount+0x17c/0x300 [ 2246.794605] ? copy_mnt_ns+0xa00/0xa00 [ 2246.795196] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2246.796028] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2246.796804] do_syscall_64+0x33/0x40 [ 2246.797312] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2246.798016] RIP: 0033:0x7f9f17289b19 [ 2246.798591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2246.801415] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2246.802423] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2246.803549] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2246.804567] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2246.805765] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2246.806748] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:37:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2246.820940] 9pnet: Could not find request transport: rdma 09:37:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 2) [ 2246.838253] nfs: Unknown parameter 'tmpfs' 09:37:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='./file0/../file0\x00', &(0x7f0000000400), 0x200040, &(0x7f0000000440)={'trans=unix,', {[{@cache_fscache}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:37:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100080, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000, 0x0, 0x0, 0x100000, &(0x7f0000000e40)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)=""/205, 0xcd}, {&(0x7f0000003540)=""/4107, 0x100b}, {&(0x7f0000000580)=""/186, 0xba}, {&(0x7f0000000680)=""/123, 0x7b}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000000380)=""/11, 0xb}, {&(0x7f0000000700)}, {&(0x7f0000000740)=""/32, 0x20}], 0x8, &(0x7f0000000800)=""/112, 0x70}, 0x2000) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r1, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000b80), 0xe9, 0x505000) sendmsg$AUDIT_MAKE_EQUIV(r2, 0x0, 0x450745c438580058) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, &(0x7f0000000d00)=0xc) syz_mount_image$iso9660(&(0x7f0000000700), &(0x7f00000008c0)='./file0/../file0\x00', 0x1000, 0x5, &(0x7f0000000c40)=[{&(0x7f0000000900)="e4bc08a3e4a6d0f8815c03c51e619f78374e5982f1c27545a9441031d3eb424ff8359e5d5cca9b1cc2b60ccb", 0x2c, 0x400}, {&(0x7f0000000940)="1996185d3e8a9d0b907fb600d2d4b51664cfed548e36e6db309c5d206f5ab5f60d3f4790a2e9b752178c86da34c7e93422a7a02b4c326280c21b04a50b6008877e3ba094e4770ca6cb32711e9c07f602e72ee11fb6e78d0199af02655eefb2c9636d80408adb080e189261a5ed20c43576c263cb70f1fe5596768e54ec5584888ce12553c9f84b9cb1e5230dc06fea1080a6e6fd6fb4e46209b85bc315631a327a8b0b4fe1ec3b12711c18de24ba03150d2ed472a67ae7f86f22620cef9128688326d8a6e49f1b07ab550d3877332b1310949b9be63ea176072a34", 0xdb, 0x7fff}, {&(0x7f0000000a40)="0ce23e04a00daf3c57ded6de2af40610f79c101e787e0847e8fc1eca5e3b574b66669ef82aca54ede7ef812f0356e1716be0755f897845375937c601b5dc66a3b01bf72576ce9f076440b290fcb8568a30cc406696e98e2b24d4ee15db3cc2c9197d3b630df251895c35c71885b6f816df57d4716325fc03b8ed344af278ca61bf1f0b791c3f1c53247f371b3cff84621963841d59a26019c9423101b9b0b19fe6409d8be7cf053914d1ba5e58733870b81689cc60ca57a390ee7a84def4c6dc3fcb000000000000000000", 0xcb, 0xffffffff}, {&(0x7f0000000b40)="a81357862beb47d7b55d9a9dfad2382537d55316c30a5a83cf91fdbe85fb3887860200efcec666eee66721aa02a5157694fd142bbd004f21", 0x38, 0x854}, {&(0x7f0000000e40)="39a9d46334294ce165ca68f7a718cb83e1e9f42af4853de312b416f50546bb6e0a80fffc2cdee5600785d6304b02bca2444581e81bfd07731d7714ab8b92be8212df2cc212ba6f5cc42722f827b5f79bc38f1ef5cd699e69c69a16b354cbe9031ca3b5a350398c0dd3f5b29de3af9698a2988f5c19dbecc7eb5a6b0e7aae4428009a0cb819db01a26e26b03ee365f988ee6233bcc1d15ad9073f6a1d821095284f852fb8afad5724da4fac9e", 0xac, 0x5}], 0x1140040, &(0x7f0000001040)=ANY=[@ANYBLOB='hide,nojoliet,sbsector=0x000000000000001f,map=acorn,gid=V', @ANYRESHEX=r3, @ANYBLOB="b8def6fac4ff0ccfca6ea9dc83e7ca900fdc890dbeef2ba801d4ffd4d5363f2548f3b46e33332545406222b921be80260622c28048a60ac0ea581f99f9f6fb46a390d3098a63b642ac5d37349c6c1073b714a42400"/100, @ANYRESHEX=r4, @ANYBLOB=',mask=^MAY_APPEND,context=staff_u,appraise_type=imasig,subj_user=}.,fsmagic=0x0000000000000001,fowner<', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) bind$unix(r1, &(0x7f0000000280)=@file={0x1, './file0/../file0\x00'}, 0x6e) 09:37:18 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5603, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:37:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2247.173388] FAULT_INJECTION: forcing a failure. [ 2247.173388] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.175047] CPU: 1 PID: 9771 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2247.176038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2247.177179] Call Trace: [ 2247.177551] dump_stack+0x107/0x167 [ 2247.178100] should_fail.cold+0x5/0xa [ 2247.178633] ? create_object.isra.0+0x3a/0xa20 [ 2247.179279] should_failslab+0x5/0x20 [ 2247.179839] kmem_cache_alloc+0x5b/0x360 [ 2247.180551] create_object.isra.0+0x3a/0xa20 [ 2247.181170] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2247.185936] __kmalloc_track_caller+0x177/0x3c0 [ 2247.186597] ? strndup_user+0x74/0xe0 [ 2247.187133] memdup_user+0x22/0xd0 [ 2247.187641] strndup_user+0x74/0xe0 [ 2247.188153] __x64_sys_mount+0x17c/0x300 [ 2247.188730] ? copy_mnt_ns+0xa00/0xa00 [ 2247.189287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2247.190039] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2247.190764] do_syscall_64+0x33/0x40 [ 2247.191283] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2247.192011] RIP: 0033:0x7f9f17289b19 [ 2247.192531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2247.195148] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2247.196306] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2247.197306] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2247.198335] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2247.199364] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2247.200367] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2247.213420] 9pnet: p9_fd_create_unix (9773): problem connecting socket: ./file0/../file0: -111 [ 2247.242872] 9pnet: p9_fd_create_unix (9779): problem connecting socket: ./file0/../file0: -111 09:37:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xca00, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:37:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:37:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000400)='ext3\x00', &(0x7f0000000440)='./file0\x00', 0x80000001, 0x7, &(0x7f00000018c0)=[{&(0x7f0000000480)="80d43f1f87ad7d05d274e64e787fe32b087ec9038b554f83e5588011ba25f2b81d1a1b475425528f4a3c811650b28e67cffcc55904fe8c14712f509d4360a5a389743c213214101953f9a9387f84857a38596b373d44f39253878925e21887f8a44b14d19c7ce02f8aed5c6fb3fbee06ceeb8b76a58023088f427e438cde2be97bcc8700", 0x84, 0xffffffffffffff1a}, {&(0x7f0000000540)="879bbb2a703a32364d7aed43fdee6fde7535ea53ef293b6ac99ae991c18fce9783501e6a87049a325056ee3f60edff40f2e7b69b5a72c3ac1448c76a2ba4d0891263b25bbc8b98e8a2675db1e81ea346d48f47b38f0f03618a2cee8312be027c151c4ca93881578cd030d2d9c2da2ba51393b8edc9e8b95d2d3540d4948cc1d2f06824f4f2b63332390f15da28f58f4cd686e4215acba6fa7bffc1c9be7999a9882574deec76215b64bdaccd4c163e9f37bd1f7eaa1d7ede4e39b2b3100db5d141fefb782e1d94a06138ddc4743c1196adef58045bd63dfba77c4d367f45ed0a015324f03d104284d8a8b360357bd676d9945e2c9a", 0xf5, 0xd22}, {&(0x7f0000000640)="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", 0x1000, 0xffffffff}, {&(0x7f0000001640)="415cf65012c1f838a337d8ee3ca9e53b72f5ef60794eff5236ba238b7a381c58e4abd5b1d2894f52dd253c4b28f06d724d3adb3ea7830efebaaf2e732abe6e916f7f2a5682ddd3d0d5789f12b22a3977adfca0f321c0c9029e2725f0bb5ada5a2e1b72c5cdd7e9f69f7faa3db740ce919d8f8a9b35a2a10c19539cb803cc8f87ec9569602b60848fcdcbae31bdb481f0504aec5dcd1499291cf70dbaea7dbf43284906bdd4933f6e6ac52239f22332b0721be5cd", 0xb4, 0x9}, {&(0x7f0000001700)="620b8fc75eb6759e36352712b3a00f74f66bf74a9b29ab2b9098dc77a3403dec26bba54f1138bafb48915c80c0a12108df052d51b4e3730f3cb9cc35aa124eab6de3c3f40497ee1580477772cd95fe49fbbea90111e6b054a5cb2c0fe5ef341e087b2024952527581dce57a53b790796dba2980ab8674f1c6cbac5f6348e55a31596146cf7d329b96a", 0x89, 0x5}, {&(0x7f00000017c0)="9ac5ac71d2de76dd9a31f777ffbe22b963774716ef1ac9f2719fadbb147f9974bd8f92083a1bc68f47a59f6e79bc0b69fabea8134b19d5f8fd5304634c1660d82f2291", 0x43, 0x100}, {&(0x7f0000001840)="75d2236a034b5ad41175a0b7f3b1fd94b0c9224517a329e67fc15a6da9280a4d51eb329c09db62ef82ebc7097a5b91c3f9bea10a1155692629441850194444747828f5b21fc7dfd6c3fecc9656634d09e55ab8", 0x53, 0x2}], 0x20001, &(0x7f0000001980)={[{@grpjquota_path={'grpjquota', 0x3d, './file0/../file0'}}, {@jqfmt_vfsv0}, {@i_version}], [{@audit}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, 'tmpfs\x00'}}, {@uid_lt={'uid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x32, 0x39, 0x34, 0x30, 0x36, 0x31, 0x66], 0x2d, [0x35, 0x5d, 0x32, 0x32], 0x2d, [0x66, 0x65, 0x0, 0x36], 0x2d, [0x64, 0x32, 0x62, 0x37], 0x2d, [0x39, 0x31, 0x64, 0x34, 0x39, 0x67, 0x32, 0x39]}}}, {@smackfsroot={'smackfsroot', 0x3d, 'Q^'}}, {@euid_lt={'euid<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x30, 0x32, 0x39, 0x34, 0x38, 0x62, 0x39], 0x2d, [0x32, 0x61, 0x34, 0x36], 0x2d, [0x63, 0x39, 0x9, 0x63], 0x2d, [0x66, 0x64, 0x38, 0x38], 0x2d, [0x32, 0x37, 0x53, 0x38, 0x36, 0x66, 0x38, 0x65]}}}]}) mount$bind(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0x2043, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:37:32 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5605, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:37:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6628, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:37:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006ac0)=[{{&(0x7f0000000780)=@abs, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000000800)=""/110, 0x6e}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/223, 0xdf}, {&(0x7f0000001980)=""/192, 0xc0}, {&(0x7f0000001a40)=""/152, 0x98}, {&(0x7f0000001b00)=""/249, 0xf9}, {&(0x7f0000001c00)=""/65, 0x41}], 0x7, &(0x7f0000001d00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001d40)=""/89, 0x59}], 0x1, &(0x7f0000001e00)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000001e80)=@abs, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001f00)=""/168, 0xa8}, {&(0x7f0000001fc0)=""/76, 0x4c}, {&(0x7f0000002040)=""/64, 0x40}, {&(0x7f0000002080)=""/51, 0x33}, {&(0x7f00000020c0)=""/44, 0x2c}], 0x5, &(0x7f0000002180)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000002240)=""/137, 0x89}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x3}}, {{&(0x7f0000004340)=@abs, 0x6e, &(0x7f0000004540)=[{&(0x7f00000043c0)=""/214, 0xd6}, {&(0x7f00000044c0)=""/46, 0x2e}, {&(0x7f0000004500)=""/35, 0x23}], 0x3, &(0x7f0000004580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000004640), 0x6e, &(0x7f0000004d40)=[{&(0x7f00000046c0)}, {&(0x7f0000004700)=""/251, 0xfb}, {&(0x7f0000004800)=""/21, 0x15}, {&(0x7f0000004840)=""/195, 0xc3}, {&(0x7f0000004940)=""/7, 0x7}, {&(0x7f0000004980)=""/46, 0x2e}, {&(0x7f00000049c0)=""/221, 0xdd}, {&(0x7f0000004ac0)=""/233, 0xe9}, {&(0x7f0000004bc0)=""/160, 0xa0}, {&(0x7f0000004c80)=""/181, 0xb5}], 0xa}}, {{&(0x7f0000004e00)=@abs, 0x6e, &(0x7f0000005000)=[{&(0x7f0000004e80)=""/253, 0xfd}, {&(0x7f0000004f80)=""/90, 0x5a}], 0x2, &(0x7f0000005040)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000005080)=@abs, 0x6e, &(0x7f0000005200)=[{&(0x7f0000005100)=""/203, 0xcb}], 0x1, &(0x7f0000005240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000005300), 0x6e, &(0x7f0000005500)=[{&(0x7f0000005380)=""/228, 0xe4}, {&(0x7f0000005480)=""/74, 0x4a}], 0x2}}, {{0x0, 0x0, &(0x7f0000006980)=[{&(0x7f0000005540)=""/198, 0xc6}, {&(0x7f0000005640)=""/151, 0x97}, {&(0x7f0000005700)=""/196, 0xc4}, {&(0x7f0000005800)=""/4096, 0x1000}, {&(0x7f0000006800)=""/15, 0xf}, {&(0x7f0000006840)=""/172, 0xac}, {&(0x7f0000006900)=""/25, 0x19}, {&(0x7f0000006940)=""/2, 0x2}], 0x8, &(0x7f0000006a00)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x90}}], 0xa, 0x40000000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000380)='./file0/../file0\x00', 0x6, 0x4, &(0x7f0000000700)=[{&(0x7f0000000400)="043f2b93f82331ff4167d400c34226ea21f210e1a4d711f2df62f133e7d73a6912e1992680bd357ef685f8ad792b1987f4f80e16ab1cf1d757f02979be30123addcb9a5e4bc6e58ba2bedf67ded4ba512cbb7ba8de31fa9bbe48ae920bcc86388fba521f60415d006852874eb73e389c441d10940c4202654edc7e2b662bd9cd89d61b0aefb70892bf6879f832809f190d2470a763c036e950a1", 0x9a, 0x9}, {&(0x7f00000004c0)="399eb8950936f02b9301d01d21fdb78e3bc9dec8b85348ef891c741e989ac08049a2f1ba869dcff7b9cdd1a096fcf505a5a54aa0050d57e675049d02342af975e7f3954d942753c7f34d16325f1f2337d9dccb37602b6dc84a1bf976901748d8e4158253fb5a0393ecddacd8c18a0b4cc89e28bb07df7ba83a5ac4ad83d3c379a59e48a8783ddeef54f3d419289c8b85cc49cbeb4c0c5dccbac40e40b2a1198c480b2a88d2fda4f99adb8e2db8db6e682f409e3c8b3dcf92c667cb6c139b9cc875e31fce708ffce83c93807c1941f22318873f9f739837d0e8ce62280de5b47c591fd8caaa5b75dddad004109bfcce5ea1cbf7", 0xf3, 0x1}, {&(0x7f00000005c0), 0x0, 0x6}, {&(0x7f0000000600)="8e841e65f2c37206dba87f503483cba5c7a1678a1338786466c5ba245168a8906df452d5a18a7a7017bbedda1257e1c165551ab2787b0102a3dd781f9b208d0041e19d031547e9d5b9c51c404d886b5215fc9a5e71d02f2e50b97dc14abf3a1b693cca5783153dccec2204a192fa070260c769f8c1660d94c39d7ee19b16214bc08b34c49f628ed739b142c761271b64203445ea55cd92c40b60f4186146212d8b2f1616e1873a8d5d09c14e8175fa13e18aab6d946238a7939e039c52e0ae93c338c26d8b7e3667c72a0d92fdbd8fd85787f7df626f5fda6f7b57b78353d3bd3e", 0xe1, 0xa4b8}], 0x0, &(0x7f0000006d40)={[{}, {@jqfmt_vfsv1}, {@journal_ioprio}, {@data_err_ignore}, {@oldalloc}, {@sb={'sb', 0x3d, 0x8}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10000}}, {@orlov}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x684}}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x34, 0x62, 0x33, 0x0, 0x36, 0x36, 0x37], 0x2d, [0x37, 0x64, 0x33, 0x62], 0x2d, [0x39, 0x37, 0x63, 0x35], 0x2d, [0x30, 0x62, 0x64, 0x65], 0x2d, [0x62, 0x35, 0x66, 0x61, 0x33, 0x65, 0x66, 0x62]}}}, {@dont_measure}, {@euid_eq={'euid', 0x3d, r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, '&'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'tmpfs\x00'}}]}) mount$bind(&(0x7f0000006ec0)='./file0/../file0\x00', &(0x7f0000007100)='./file0/file0\x00', &(0x7f0000007140), 0x200000, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000006f00)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000007000)=0xe8) mount$9p_xen(&(0x7f00000005c0), &(0x7f00000046c0)='./file0/file0\x00', &(0x7f0000006e80), 0x887804, &(0x7f0000007040)={'trans=xen,', {[{@cache_fscache}], [{@seclabel}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r2}}, {@appraise_type}, {@euid_gt={'euid>', r3}}]}}) 09:37:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 3) 09:37:32 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 09:37:32 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5606, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2261.738779] FAULT_INJECTION: forcing a failure. [ 2261.738779] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2261.741303] CPU: 1 PID: 9798 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2261.742772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.744431] Call Trace: [ 2261.744985] dump_stack+0x107/0x167 [ 2261.745735] should_fail.cold+0x5/0xa [ 2261.746530] _copy_from_user+0x2e/0x1b0 [ 2261.747347] memdup_user+0x65/0xd0 [ 2261.748066] strndup_user+0x74/0xe0 [ 2261.748821] __x64_sys_mount+0x17c/0x300 [ 2261.749641] ? copy_mnt_ns+0xa00/0xa00 09:37:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2261.750454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2261.751647] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2261.752714] do_syscall_64+0x33/0x40 [ 2261.753230] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2261.753483] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2261.755737] RIP: 0033:0x7f9f17289b19 [ 2261.756500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.760303] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2261.761873] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2261.763329] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2261.764788] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2261.766259] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2261.767719] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2261.897443] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 09:37:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xe803, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:37:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 4) 09:37:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 09:37:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3fb062, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:37:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5607, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:37:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) stat(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000400)) 09:37:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40046629, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:37:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2278.556188] FAULT_INJECTION: forcing a failure. [ 2278.556188] name failslab, interval 1, probability 0, space 0, times 0 [ 2278.557377] CPU: 0 PID: 9834 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2278.558292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2278.559403] Call Trace: [ 2278.559762] dump_stack+0x107/0x167 [ 2278.560250] should_fail.cold+0x5/0xa [ 2278.560757] ? getname_flags.part.0+0x50/0x4f0 [ 2278.561368] should_failslab+0x5/0x20 [ 2278.561878] kmem_cache_alloc+0x5b/0x360 [ 2278.562430] getname_flags.part.0+0x50/0x4f0 [ 2278.563015] user_path_at_empty+0xa1/0x100 [ 2278.563581] __x64_sys_mount+0x1e9/0x300 09:37:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5608, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2278.564120] ? copy_mnt_ns+0xa00/0xa00 [ 2278.564657] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2278.565350] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2278.566038] do_syscall_64+0x33/0x40 [ 2278.566532] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2278.567206] RIP: 0033:0x7f9f17289b19 [ 2278.567700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2278.570126] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2278.571149] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2278.572083] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2278.573017] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2278.573951] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2278.574896] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:37:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 5) 09:37:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:37:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x101, 0x8, &(0x7f0000001840)=[{&(0x7f0000000400)="d97bd5f35a7bdfa640a575d51071557364a0707a639ab89d6779bb9bfb7ceaef0444e72211c47b4450134060047e997a218d5a38e1015e2fdb3fb53d225aea51ff0db92374046d320f76d22ed752eb3fe0f239f946155dc96d33a9b9c96235395d19c390e10c58b8ea8803aba8d69fab81f4065473772d271be4b294c2b60ab8af14aa03d222db6462fc90fb347bec8a2fa2c030670f425805300ab7fbd269fb46269b80", 0xa4, 0x3ff}, {&(0x7f00000004c0)="9668c5b2306306c361fd867e89862e7923de752d2e09efc0d56c95d907302671a8c8ca78d4901864194d618f323a455cbe745a2c9a5b75be4ee1fddd43f3377a64f1730b0307501711b1cb50d5bca1aa4a3b3f761d1146f38f6b57ca8c0c6b02638596ad53b12ec892f27b559efd75c8ba0905ba48523fe7fff8c5e977ebd517ff75699bc1a695ed412cad58aec439e1921de06625c51b80184c8d9997fe9f66e464bebf4fea6d8e7959023ecbb3770d401156885e3898cae6b5659c50fdf9eb17e3b827d588f175dae311", 0xcb}, {&(0x7f00000005c0)="06f71d22a4db22301dfcd25d2b61a9b5088ee0fdaaa6ca49efc325b4e00dae98ac61b3a954d71000799010a9a0d0b4e35c7bd738539379ebe216be6d8f9bbfdd2733bd86607c099b366f1ac78e9e5a88b882be920fd8bcd221c78787d4f74545e9b01b5c18c9b7413993de612dfcd69feca3e4256354ca98ef79976d2dc7151687c7d2f253e5b3f3e8ccc2aabc1792b0be05f9099a3f701241d7ca351bc0eadf12de249db3e92c609cd60c4f8ca4d16f130648c536", 0xb5, 0x2}, {&(0x7f0000000380)="f9c41e987628a013", 0x8, 0x800}, {&(0x7f0000000680)="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", 0xfe, 0xfffffffffffffffa}, {&(0x7f0000000780)="f02b0a960d0de4e7335248bfa33b0f77935ce46c57202bef9105627e2e3592ebc40cd7dae97637a528697ef2686ebd49", 0x30}, {&(0x7f00000007c0)="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", 0x1000, 0x8}, {&(0x7f00000017c0)="be4b2e0579b9002abd0e4331b03849bbcaca245f35b71f489f0daad7c0fd7b740a48d13dd809d776b6a4f9a02bd3510c5bd90a61c429af09e438fc70309300bcffba2e2d1f50fba110a601eaa313d0ab697df0e6a2db", 0x56, 0x7ff}], 0x38a2001, &(0x7f0000001900)=ANY=[@ANYBLOB='abort,nojournal_checksum,noblocer<\x00'/49, @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) 09:37:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="2e2f66696c9595c8b6e9fbac5465302f664d17fd4400"], &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='pvfs2\x00', 0x800014, &(0x7f0000000440)='\\,\x00') stat(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bind(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), 0x800, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f00000004c0)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000580)=[{&(0x7f0000000500)="fe6644b69916f6bc78e06249a04908510c725c", 0x13, 0x80000000}, {&(0x7f0000000540)="d012631bd8a29f4b7f74d379e3cf7badbc2fe2bb88f61cb7c9322bd83f16494fd62506f5008c592075e64e249c5f9081ca6832", 0x33, 0x2}], 0x10a0808, &(0x7f0000000680)={[{@fat=@check_normal}, {@shortname_win95}, {@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@shortname_win95}, {@utf8no}, {@rodir}, {@shortname_winnt}], [{@seclabel}, {@fowner_gt={'fowner>', r0}}, {@permit_directio}, {@euid_lt={'euid<', 0xee01}}, {@measure}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@subj_user={'subj_user', 0x3d, '{./'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\,\x00'}}]}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000840)='./file0\x00', 0x10) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2278.821773] FAULT_INJECTION: forcing a failure. [ 2278.821773] name failslab, interval 1, probability 0, space 0, times 0 [ 2278.824340] CPU: 1 PID: 9847 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2278.825876] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2278.827740] Call Trace: [ 2278.828286] dump_stack+0x107/0x167 [ 2278.829093] should_fail.cold+0x5/0xa [ 2278.829997] ? create_object.isra.0+0x3a/0xa20 [ 2278.831001] should_failslab+0x5/0x20 [ 2278.831906] kmem_cache_alloc+0x5b/0x360 [ 2278.832726] ? __might_fault+0xd3/0x180 [ 2278.833587] create_object.isra.0+0x3a/0xa20 [ 2278.834620] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2278.835651] kmem_cache_alloc+0x159/0x360 [ 2278.836502] getname_flags.part.0+0x50/0x4f0 [ 2278.837459] user_path_at_empty+0xa1/0x100 [ 2278.838437] __x64_sys_mount+0x1e9/0x300 [ 2278.839301] ? copy_mnt_ns+0xa00/0xa00 [ 2278.840094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2278.841222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2278.842416] do_syscall_64+0x33/0x40 [ 2278.843173] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2278.844204] RIP: 0033:0x7f9f17289b19 [ 2278.844957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2278.848685] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2278.850247] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2278.851686] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2278.853149] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2278.854605] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2278.856051] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:37:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:37:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5609, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:37:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x2, 0x2, 0x524a, 0x4}) 09:38:04 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x944008, &(0x7f0000000040)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/../file0\x00', 0x60) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) statx(r0, &(0x7f0000000080)='./file0/../file0\x00', 0x1500, 0x1, &(0x7f0000000400)) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x200b001, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xf401, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:38:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x2, 0x2, 0x524a, 0x4}) 09:38:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 6) 09:38:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40049409, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:38:04 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x560a, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:38:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x300000, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x0) 09:38:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:38:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x560b, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2293.973176] FAULT_INJECTION: forcing a failure. [ 2293.973176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2293.976157] CPU: 1 PID: 9892 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2293.977872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2293.979847] Call Trace: [ 2293.980517] dump_stack+0x107/0x167 [ 2293.981375] should_fail.cold+0x5/0xa [ 2293.982319] strncpy_from_user+0x34/0x470 [ 2293.983369] getname_flags.part.0+0x95/0x4f0 [ 2293.984357] user_path_at_empty+0xa1/0x100 [ 2293.985400] __x64_sys_mount+0x1e9/0x300 [ 2293.986454] ? copy_mnt_ns+0xa00/0xa00 [ 2293.987344] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2293.988666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2293.989842] do_syscall_64+0x33/0x40 [ 2293.990767] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2293.992043] RIP: 0033:0x7f9f17289b19 [ 2293.992851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2293.997332] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2293.999131] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2294.000838] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2294.002483] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2294.004114] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2294.005876] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:38:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:38:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) rename(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000140)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x8}, 0x0, 0x6e6bba}, {{@in=@remote, 0x0, 0x6c}, 0x0, @in=@rand_addr=0x64810100, 0x3501}}, 0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) ftruncate(0xffffffffffffffff, 0x1000003) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) unshare(0x48020200) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:05 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x560c, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:38:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 7) 09:38:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/file0\x00', 0x0) 09:38:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r4, r2, 0x0, 0x7ffffff9) fallocate(r1, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x2, 0x2, 0x524a, 0x4}) 09:38:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086602, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) [ 2294.502863] FAULT_INJECTION: forcing a failure. [ 2294.502863] name failslab, interval 1, probability 0, space 0, times 0 [ 2294.505637] CPU: 1 PID: 9912 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2294.507135] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2294.509111] Call Trace: [ 2294.509794] dump_stack+0x107/0x167 [ 2294.510598] should_fail.cold+0x5/0xa [ 2294.511426] ? getname_kernel+0x4e/0x370 [ 2294.512304] should_failslab+0x5/0x20 [ 2294.513126] kmem_cache_alloc+0x5b/0x360 [ 2294.514016] getname_kernel+0x4e/0x370 [ 2294.514864] kern_path+0x1b/0x40 [ 2294.515605] path_mount+0xb18/0x20b0 [ 2294.516453] ? strncpy_from_user+0x9e/0x470 [ 2294.517518] ? finish_automount+0xa40/0xa40 [ 2294.518567] ? getname_flags.part.0+0x1dd/0x4f0 [ 2294.519596] __x64_sys_mount+0x282/0x300 [ 2294.520476] ? copy_mnt_ns+0xa00/0xa00 [ 2294.521327] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2294.522472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2294.523596] do_syscall_64+0x33/0x40 [ 2294.524478] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2294.525685] RIP: 0033:0x7f9f17289b19 [ 2294.526710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2294.531181] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2294.533112] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2294.534878] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2294.536416] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2294.537948] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2294.539518] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2310.433591] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:38:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086604, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:38:29 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x560d, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:38:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresgid(&(0x7f0000001c00), &(0x7f0000004d40), &(0x7f0000005080)=0x0) chown(&(0x7f00000005c0)='./file0/../file0\x00', 0xee00, r0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000400)=""/171, 0xab}, {&(0x7f00000004c0)=""/214, 0xd6}, {&(0x7f00000005c0)}, {&(0x7f0000000600)=""/98, 0x62}], 0x4}}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f00000006c0)=""/103, 0x67}, {&(0x7f0000000740)=""/23, 0x17}, {&(0x7f0000000780)=""/181, 0xb5}, {&(0x7f0000000840)=""/179, 0xb3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x5, &(0x7f0000001980)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001a80)=""/223, 0xdf}, {&(0x7f0000001b80)=""/81, 0x51}, {&(0x7f0000001c00)}], 0x3, &(0x7f0000001c80)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000002180), 0x0, &(0x7f0000002200)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd0}}, {{&(0x7f0000002300), 0x6e, &(0x7f0000003380)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1, &(0x7f00000033c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}}, {{&(0x7f0000003480)=@abs, 0x6e, &(0x7f0000004880)=[{&(0x7f0000003500)=""/145, 0x91}, {&(0x7f00000035c0)=""/112, 0x70}, {&(0x7f0000003640)=""/111, 0x6f}, {&(0x7f00000036c0)=""/187, 0xbb}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000004780)=""/156, 0x9c}, {&(0x7f0000004840)=""/22, 0x16}], 0x7, &(0x7f0000004900)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000004940)=@abs, 0x6e, &(0x7f0000004cc0)=[{&(0x7f00000049c0)=""/29, 0x1d}, {&(0x7f0000004a00)=""/224, 0xe0}, {&(0x7f0000004b00)=""/32, 0x20}, {&(0x7f0000004b40)=""/114, 0x72}, {&(0x7f0000004bc0)=""/229, 0xe5}], 0x5, &(0x7f0000004d40)}}], 0x7, 0x12163, &(0x7f0000004f40)) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000005040)={&(0x7f0000004f80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000005000)={&(0x7f0000004fc0)={0x3c, 0x3f7, 0x300, 0x70bd2b, 0x25dfdbfb, {0x13, 0x10, './file0/file0/file0', './file0/../file0'}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008001}, 0x800) pivot_root(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00') r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) openat(r2, &(0x7f0000000280)='./file0/../file0\x00', 0x4000, 0x0) 09:38:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0xff00, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:38:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:38:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 8) 09:38:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000002c0)={r0, 0x3ff, 0xe408, 0xff}) fchmodat(r1, &(0x7f0000000380)='./file0/../file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) sendmsg$AUDIT_LIST_RULES(r2, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x10, 0x3f5, 0x8, 0x70bd28, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x800) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x0, 0x2, 0x524a, 0x4}) 09:38:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x560e, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2318.949633] FAULT_INJECTION: forcing a failure. [ 2318.949633] name failslab, interval 1, probability 0, space 0, times 0 [ 2318.952205] CPU: 1 PID: 9938 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2318.953671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2318.955460] Call Trace: [ 2318.956040] dump_stack+0x107/0x167 [ 2318.956835] should_fail.cold+0x5/0xa [ 2318.957662] ? create_object.isra.0+0x3a/0xa20 [ 2318.958667] should_failslab+0x5/0x20 [ 2318.959487] kmem_cache_alloc+0x5b/0x360 [ 2318.960369] create_object.isra.0+0x3a/0xa20 [ 2318.961317] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2318.962499] kmem_cache_alloc+0x159/0x360 [ 2318.963410] getname_kernel+0x4e/0x370 [ 2318.964246] kern_path+0x1b/0x40 [ 2318.964989] path_mount+0xb18/0x20b0 [ 2318.965796] ? strncpy_from_user+0x9e/0x470 [ 2318.966731] ? finish_automount+0xa40/0xa40 [ 2318.967659] ? getname_flags.part.0+0x1dd/0x4f0 [ 2318.968673] __x64_sys_mount+0x282/0x300 [ 2318.969548] ? copy_mnt_ns+0xa00/0xa00 [ 2318.970391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2318.971529] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2318.972639] do_syscall_64+0x33/0x40 [ 2318.973439] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2318.974544] RIP: 0033:0x7f9f17289b19 09:38:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2318.975345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2318.979641] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2318.981276] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2318.982815] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2318.984345] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2318.985875] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2318.987417] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2318.998907] EXT4-fs warning (device sda): __ext4_ioctl:884: Setting inode version is not supported with metadata_csum enabled. 09:38:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 9) 09:38:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x81080, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000380), &(0x7f0000000400)='./file0/../file0\x00', 0x5, 0x2, &(0x7f0000000640)=[{&(0x7f0000000440)="c60d02c6390ba020091d6d108e58be65e88c41c2bfbceab7fba404aeeb5c53c21530982fc2516e35e1f3aae3d634a74472730da97f3f8508b5b2e91d1198462490c9674da2f23e685ed72f68dddf937cb44301fc1d17ab7a0fb47c00b8ffce142866185c472c66a387510b2459a1290c55fabd6036ae282d574ccdd25df6394ed9953c6edd51f178f7ccbe66565df9365eaeac9e5fb4322c11670cbfa58eb2ca9e3acfd05882999faf33aba43f8218e393d81d6d072bb89eaa37bcbc237b4068f1cbc5c3494c364fada4cc56810211ad65c7de88744b8e521a20a74c8fdc4dfb17acb0e35cc454e4", 0xe8, 0x3}, {&(0x7f0000000540)="58b9fee544c22ac5d4f5ecd34ecd71729a0dba6bff75435307f9344512e3d9a794f666fede7ad91f04409d97de1d2d5916d55928719a015b6180481f2819ee4b4cf1ec6e2ca7b4a1a8e75ef5309414ef9b265ce8fe8e0ed49109319738b0c5d0c0a74f1178dd7b58c7150fa7eb138fe5252eddb874ae1980d8ab8d062b3ec7d0aa6529103db15fd5cb1b15bfc60a1ef99b2bdfa5424f89cf857cbca648f16557d90f28680a1fa76fb493c990532a06291b5d02506380e8ce6cd584bd8be83b111baaf2c45a9da1589ac73be77124d81aff66043160452e9b198ce6270c74a3", 0xdf, 0x5}], 0xc, &(0x7f0000000680)={[{@nodots}, {@nodots}, {@dots}, {@dots}, {@fat=@check_normal}, {@fat=@gid}, {@dots}, {@nodots}, {}], [{@smackfsroot={'smackfsroot', 0x3d, '()'}}]}) openat(r0, &(0x7f0000000700)='./file2\x00', 0x800, 0xa4) chdir(&(0x7f00000002c0)='./file0\x00') mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:30 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x560f, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:38:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) [ 2319.522834] FAULT_INJECTION: forcing a failure. [ 2319.522834] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.525708] CPU: 0 PID: 9955 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2319.527348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2319.529158] Call Trace: [ 2319.529743] dump_stack+0x107/0x167 [ 2319.530541] should_fail.cold+0x5/0xa [ 2319.531388] ? create_object.isra.0+0x3a/0xa20 [ 2319.532385] should_failslab+0x5/0x20 [ 2319.533218] kmem_cache_alloc+0x5b/0x360 [ 2319.534111] create_object.isra.0+0x3a/0xa20 [ 2319.535093] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2319.536202] kmem_cache_alloc+0x159/0x360 [ 2319.537118] getname_kernel+0x4e/0x370 [ 2319.537967] kern_path+0x1b/0x40 [ 2319.538725] path_mount+0xb18/0x20b0 [ 2319.539546] ? strncpy_from_user+0x9e/0x470 [ 2319.540527] ? finish_automount+0xa40/0xa40 [ 2319.541464] ? getname_flags.part.0+0x1dd/0x4f0 [ 2319.542494] __x64_sys_mount+0x282/0x300 [ 2319.543392] ? copy_mnt_ns+0xa00/0xa00 [ 2319.544239] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2319.545370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2319.546485] do_syscall_64+0x33/0x40 [ 2319.547298] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2319.548403] RIP: 0033:0x7f9f17289b19 [ 2319.549208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2319.553162] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2319.554821] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2319.556354] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2319.557888] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2319.559431] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000001 [ 2319.560955] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2319.562657] hpet: Lost 1 RTC interrupts [ 2319.598018] FAT-fs (loop5): Unrecognized mount option "smackfsroot=()" or missing value 09:38:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) [ 2319.680267] FAT-fs (loop5): Unrecognized mount option "smackfsroot=()" or missing value [ 2334.837290] kmemleak: 38 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:38:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 10) 09:38:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6609, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:38:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:38:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x13080, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:38:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x0, 0x2, 0x524a, 0x4}) 09:38:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x26212eec12f249a7, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x40049409, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:38:54 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0/file0\x00', 0x4e, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="2a847a104ea1c02a50b685688ee66ded1ec75ab4a9d01c0e2f11a2003731814e02f2e9696b4551aed1aceb854525459a027a016e2f5268d7ae1d6b689fd8b61f833bc3bd04a65fe6973a7b80c2849d6dc5c83322a0dadf5add7ee3fbf918ab1b71d424ba250afb43b574d14dcf71ae7313490cfd71f0fe3d410c401270818721ede594e14a84826c5b6776432c8d9276a7f0fcd63b1a9b57d5c739ae3fb0c37b3a917148d779dad2660246e65c08a8d18f38602f0c14d2298c1f", 0xba, 0x3ff}, {&(0x7f0000000380)="33cd8c105e113bf3823fe575c587d744829cb1", 0x13, 0xffffffff}, {&(0x7f00000004c0)="c86f706f43d691a405aadca7c6321ff68590a937a000d506efa3e8d1c77dda0eaf8f497915402490d0e7362211fc84763ad48c8115d721f1d7d1417d60489fb2bf5dee4883047d8fbeb3372ea74c06a4585eea2e51919f8beb61c02561e206468e3f67eaee065e65453dc82ecaddd96a7ca9e6b47069f137038de56802cf300147761e0e4d48a3c118eb5e2353d58b877b5c2c39c3d5642a98e73d8b0988bf86d2fe9934cb9190d31bc370ed876a9078d79357287ac9fd", 0xb7, 0xea}], 0x300c01, &(0x7f0000000700)={[{@fat=@errors_continue}, {@shortname_lower}], [{@dont_appraise}, {@fowner_gt={'fowner>', 0xee01}}, {@fowner_eq={'fowner', 0x3d, r1}}]}) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x40086602, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2343.113247] FAULT_INJECTION: forcing a failure. [ 2343.113247] name failslab, interval 1, probability 0, space 0, times 0 [ 2343.116218] CPU: 0 PID: 9991 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2343.117685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2343.119735] Call Trace: [ 2343.120395] dump_stack+0x107/0x167 [ 2343.121321] should_fail.cold+0x5/0xa [ 2343.122273] ? create_object.isra.0+0x3a/0xa20 [ 2343.123417] should_failslab+0x5/0x20 [ 2343.124356] kmem_cache_alloc+0x5b/0x360 [ 2343.125382] create_object.isra.0+0x3a/0xa20 [ 2343.126466] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2343.127695] kmem_cache_alloc_trace+0x151/0x360 [ 2343.128763] get_mountpoint+0x14b/0x3e0 [ 2343.129645] lock_mount+0xeb/0x2f0 [ 2343.130449] path_mount+0xb7d/0x20b0 [ 2343.131307] ? strncpy_from_user+0x9e/0x470 [ 2343.132271] ? finish_automount+0xa40/0xa40 [ 2343.133234] ? getname_flags.part.0+0x1dd/0x4f0 [ 2343.134299] __x64_sys_mount+0x282/0x300 [ 2343.135226] ? copy_mnt_ns+0xa00/0xa00 [ 2343.136100] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2343.137267] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2343.138429] do_syscall_64+0x33/0x40 [ 2343.139284] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2343.140423] RIP: 0033:0x7f9f17289b19 [ 2343.141259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2343.145345] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2343.147218] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2343.148967] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2343.150696] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2343.152437] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2343.154174] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2343.155927] hpet: Lost 2 RTC interrupts 09:38:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:38:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:38:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 11) 09:38:54 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0/file0\x00', 0x2, 0x1, &(0x7f0000000380)=[{&(0x7f0000000400)="41df921715b162dd1d5e7f3a18382e68749faf9845b4d55f370275962b44dc4367b71305f00cea1c49a0ec54bb7fc59907eebba0bafb6677a8508f08009cb2a8448f305e55accde8730ee1348da1d29c133964382654143fc1df93940023f603112a1c88ba124df6e93c1d200ed1d3b81d65b1f0298d5f5a8457da8a6e", 0x7d, 0x5}], 0x1000000, &(0x7f0000000480)={[{@init_itable_val={'init_itable', 0x3d, 0xffffffff}}, {}, {@noacl}, {@mblk_io_submit}, {@data_err_abort}], [{@hash}, {@dont_measure}]}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) mount$bind(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600), 0x8008, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) symlinkat(&(0x7f0000000640)='./file0\x00', r1, &(0x7f0000000680)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000500)='/.{^}\x00', &(0x7f0000000540)='./file0/../file0\x00', r0) 09:38:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x40087602, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:38:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40087602, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) [ 2343.705218] FAULT_INJECTION: forcing a failure. [ 2343.705218] name failslab, interval 1, probability 0, space 0, times 0 [ 2343.706538] CPU: 1 PID: 10008 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2343.707478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2343.708378] Call Trace: [ 2343.708736] dump_stack+0x107/0x167 [ 2343.709230] should_fail.cold+0x5/0xa [ 2343.709738] ? create_object.isra.0+0x3a/0xa20 [ 2343.710344] should_failslab+0x5/0x20 [ 2343.710847] kmem_cache_alloc+0x5b/0x360 [ 2343.711405] create_object.isra.0+0x3a/0xa20 [ 2343.711986] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2343.712729] kmem_cache_alloc_trace+0x151/0x360 [ 2343.713353] get_mountpoint+0x14b/0x3e0 [ 2343.713883] lock_mount+0xeb/0x2f0 [ 2343.714357] path_mount+0xb7d/0x20b0 [ 2343.714870] ? strncpy_from_user+0x9e/0x470 [ 2343.715444] ? finish_automount+0xa40/0xa40 [ 2343.716011] ? getname_flags.part.0+0x1dd/0x4f0 [ 2343.716635] __x64_sys_mount+0x282/0x300 [ 2343.717171] ? copy_mnt_ns+0xa00/0xa00 [ 2343.717687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2343.718378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2343.719070] do_syscall_64+0x33/0x40 [ 2343.719562] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2343.720233] RIP: 0033:0x7f9f17289b19 [ 2343.720723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2343.722942] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2343.723756] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2343.724517] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2343.725282] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2343.726034] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2343.726807] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:38:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x0, 0x2, 0x524a, 0x4}) [ 2343.769156] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2343.916393] EXT4-fs warning (device sda): __ext4_ioctl:884: Setting inode version is not supported with metadata_csum enabled. [ 2344.226171] EXT4-fs warning (device sda): __ext4_ioctl:884: Setting inode version is not supported with metadata_csum enabled. [ 2360.342259] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:39:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 12) 09:39:20 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x4874000, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x509a, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='io\x00') readv(r2, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) recvfrom(r2, &(0x7f00000005c0)=""/245, 0xf5, 0x20, &(0x7f00000006c0)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x20b009, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x6, &(0x7f0000000500)={'trans=unix,', {[{@fscache}, {@privport}], [{@smackfsdef={'smackfsdef', 0x3d, 'func'}}, {@subj_user={'subj_user', 0x3d, 'afid'}}]}}) r3 = signalfd(r1, &(0x7f0000000040), 0x8) move_mount(r3, &(0x7f0000000480)='./file0/../file0\x00', r0, &(0x7f00000004c0)='./file0\x00', 0x20) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:39:20 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x524a, 0x4}) 09:39:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x400c6615, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:39:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:39:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x23080, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:39:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000280)='./file0/../file0\x00', 0x2, 0x1) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000380)='./file0/file0\x00', 0x70, 0x2, &(0x7f0000000540)=[{&(0x7f0000000400)="6e496510c3381967218239ce240301edc9377296959bfc7a0f5654d835ac2365285735ab6129af38749d972844951274bc6934a5d6765c99f037ed0ec2833fa54a68f9b566cb9e59e1c7c77e", 0x4c, 0x3}, {&(0x7f0000000480)="3d77a4e255629b7d7c116e18d44bf5e39de989910ce4f29f630e3f39c1c8b8ac3fb38240c90e48b1194ce2683a543bc2a86bd1ffb7698b4a4240219b312062a2a904685e8b4a62d6b6ee0b507325ad77af5e5ef85c47accfe0230e3b8adf9960a116cde6b5c4081c77a335560249a27e665a3833147db789cd93ccfa0b293a943e2cd551cebc915128e7792315bda7503723bf97bb4d7bea6a833a1e8362dfc535a3402572190eb57e910f62", 0xac, 0x8}], 0x10082, &(0x7f0000000640)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r0, @ANYBLOB="2c7362736563746f723d3078303030303030303030303030303030242c636865636b3d72656c617865642c7375626a5f747970653d212c7375626a5f747970653d746d706673002c0086ba2495c9354937528fa6ff88024b647b789d5448c3962d86e034808bf2a9970b1da99ee10116d232ef3643d0a83fd6cb64503a39ceeb60ccd36f458842e747"]) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x3) 09:39:20 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4020940d, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:39:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) getresuid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0x20800, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@aname={'aname', 0x3d, '%-}\xf5/]+'}}, {@posixacl}, {@noextend}, {@fscache}, {@msize={'msize', 0x3d, 0x7f}}, {@version_9p2000}, {@fscache}], [{@fsname={'fsname', 0x3d, 'tmpfs\x00'}}, {@fowner_gt={'fowner>', r1}}]}}) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2369.720863] FAULT_INJECTION: forcing a failure. [ 2369.720863] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.723443] CPU: 1 PID: 10041 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2369.724939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2369.726733] Call Trace: [ 2369.727347] dump_stack+0x107/0x167 [ 2369.728148] should_fail.cold+0x5/0xa [ 2369.729063] ? create_object.isra.0+0x3a/0xa20 [ 2369.730067] should_failslab+0x5/0x20 [ 2369.730895] kmem_cache_alloc+0x5b/0x360 [ 2369.731791] ? perf_trace_lock+0xac/0x490 [ 2369.732707] create_object.isra.0+0x3a/0xa20 [ 2369.733668] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2369.734783] kmem_cache_alloc+0x159/0x360 [ 2369.735715] alloc_vfsmnt+0x23/0x680 [ 2369.736544] clone_mnt+0x6c/0xce0 [ 2369.737308] copy_tree+0xfe/0xa60 [ 2369.738095] __do_loopback+0x196/0x3e0 [ 2369.738954] path_mount+0x1bc1/0x20b0 [ 2369.739810] ? strncpy_from_user+0x9e/0x470 [ 2369.740752] ? finish_automount+0xa40/0xa40 [ 2369.741865] ? getname_flags.part.0+0x1dd/0x4f0 [ 2369.743001] __x64_sys_mount+0x282/0x300 [ 2369.743948] ? copy_mnt_ns+0xa00/0xa00 [ 2369.744856] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2369.745993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2369.747121] do_syscall_64+0x33/0x40 [ 2369.747955] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2369.749070] RIP: 0033:0x7f9f17289b19 [ 2369.749969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.754132] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2369.755886] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2369.757436] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2369.759078] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2369.760823] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2369.762432] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:39:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 13) 09:39:21 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x80045432, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:39:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:39:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) setxattr(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_access\x00', &(0x7f0000000380)='tmpfs\x00', 0x6, 0x2) 09:39:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) setxattr$security_capability(&(0x7f0000001700)='./file0/file0\x00', &(0x7f0000001740), &(0x7f0000001780)=@v2={0x2000000, [{0x0, 0x400}, {0xad5, 0x200}]}, 0x14, 0xe37dc0a6787d8b4e) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000001900)=""/128, 0x80, 0x40001042, 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000380)='./file0/file0\x00', 0x7ff, 0x5, &(0x7f0000001680)=[{&(0x7f0000000400)="3918341b8bcba5ad90afd9208539a60a4d7f2baaee9f7425d1678b78b6e525f3d1fe0f3d832a32fa2f2c2a604b7e3b9cc7ac4ca954860775a206adaa60d7645fb252d33fcdc2ed3d4ba1bd51047963eeb039dc6a8da3c35a70203157", 0x5c, 0xfffffffffffffffb}, {&(0x7f0000000480)="d4d077d3b240cdd713eeb3dafc6eb58ce04d7c8e10f841672ec5c9ba5703a8f78629ab5f7707d743e5deb420321e623448d9fc72631116c16c5f9246a817eabe1be1f6d225fbfb5a0ab574841bc9d8efa6701b0b780b3f27347d2ab94b2153e7048552371be69ebe905bee23c940266dee5312226e5d48684cf93952cc3ca92f072aed820eb347d599e2c744658ee58a5f4a89f2a91def36c75d9a570846520e5eaab24f6448c0fe438bf03a5b6eb03b0853163e933d638d7238acb45016e82ab343fc29f7a08e877875117f8b4ca0e69ebc4d29e57047e502e178bcb72affa5d7259fc801f4ec5aebdd39acebd4", 0xee}, {&(0x7f0000000580)="40e13c7b475d193a9e3280b82494d2df3ba94c1d37fbd34e134776af70bc25935e39c9a62bfc4ae3586deea933493eac8a", 0x31, 0xfffffffffffffffd}, {&(0x7f00000005c0)="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", 0x1000, 0x2d4}, {&(0x7f00000015c0)="d938523352e74c2e4c164dbb22890d262a7bb73774bbb5a814b1b8a822303c1107eaffefee6777f7ee12d05d7341b2cb3ddc849e300b4c82f2e6c9b004f488e4a64a8a1aab428cb7cb5cbcf12387fe321e9648af3d7d25c7866c86ed779a5d71f36d0f21e5f892674b31cc6c520cc692da3c7f13472c26632bd373dcf5906188cc94bea7950f28109b09a47d9b48072c9b8c2bd9da2117bde442a04ecd944a", 0x9f, 0x2a1}], 0xa0000, &(0x7f0000001800)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0xee01, @ANYBLOB="2c687567653d77643d00000000000000000e00000000591c3be297766fc66ab1eb4dd8f3b9fe322c351199eb23020062d9467f1f6e5252990a7738cef48d60d4d865310eb4587edd6192078c24c479bc994041a8033cf779fb751fc5b0f8773b487d3bc65d6d6e1e96a29a50b7fbe61c744bdc152eef4b", @ANYRESHEX=r0, @ANYBLOB=',fsuuid=f88W49b3-1a0e-ff95-5a8d-0cfe0406,\x00']) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2370.271483] FAULT_INJECTION: forcing a failure. [ 2370.271483] name failslab, interval 1, probability 0, space 0, times 0 [ 2370.274260] CPU: 0 PID: 10059 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2370.275803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2370.277517] Call Trace: [ 2370.278072] dump_stack+0x107/0x167 [ 2370.278834] should_fail.cold+0x5/0xa [ 2370.279653] ? create_object.isra.0+0x3a/0xa20 [ 2370.280595] should_failslab+0x5/0x20 [ 2370.281378] kmem_cache_alloc+0x5b/0x360 [ 2370.282221] create_object.isra.0+0x3a/0xa20 [ 2370.283133] kmemleak_alloc_percpu+0xa0/0x100 [ 2370.284078] pcpu_alloc+0x4e2/0x12f0 [ 2370.284920] alloc_vfsmnt+0xfd/0x680 [ 2370.285695] clone_mnt+0x6c/0xce0 [ 2370.286456] copy_tree+0xfe/0xa60 [ 2370.287189] __do_loopback+0x196/0x3e0 [ 2370.288026] path_mount+0x1bc1/0x20b0 [ 2370.288826] ? strncpy_from_user+0x9e/0x470 [ 2370.289753] ? finish_automount+0xa40/0xa40 [ 2370.290646] ? getname_flags.part.0+0x1dd/0x4f0 [ 2370.291641] __x64_sys_mount+0x282/0x300 [ 2370.292475] ? copy_mnt_ns+0xa00/0xa00 [ 2370.293286] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2370.294358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2370.295431] do_syscall_64+0x33/0x40 [ 2370.296197] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2370.297252] RIP: 0033:0x7f9f17289b19 [ 2370.298019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2370.301791] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2370.303358] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2370.304809] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2370.306258] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2370.307729] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2370.309204] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2370.310891] hpet: Lost 2 RTC interrupts 09:39:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40106614, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:39:21 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x80045440, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2385.396563] kmemleak: 40 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:39:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x401c5820, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:39:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:39:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x80000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:39:45 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x524a, 0x4}) 09:39:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 14) 09:39:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x4000, 0x0) r1 = inotify_init() mount$9p_unix(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480), 0x2446, &(0x7f00000004c0)={'trans=unix,', {[{@cache_none}, {@access_client}, {@aname={'aname', 0x3d, '&*[}{@\xcd}\\'}}, {@cache_loose}, {@cache_mmap}, {@noextend}, {@uname={'uname', 0x3d, '/dev/autofs\x00'}}], [{@seclabel}, {@subj_role}, {@dont_hash}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0x480202, 0x0) ioctl$EXT4_IOC_GETSTATE(r2, 0x40046629, &(0x7f0000000380)) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, @out_args}, './file0/../file0\x00'}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) umount2(&(0x7f0000000140)='./file0/file0\x00', 0x4) 09:39:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) setxattr$security_ima(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000000400), &(0x7f0000000440)=@v1={0x2, "a29be771cb90d1e22a3bc2e161615db12e4b"}, 0x13, 0x2) umount2(&(0x7f00000002c0)='./file0\x00', 0x81421d33da194fff) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:39:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x80086601, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2394.896763] FAULT_INJECTION: forcing a failure. [ 2394.896763] name failslab, interval 1, probability 0, space 0, times 0 [ 2394.899432] CPU: 1 PID: 10089 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2394.901113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2394.902908] Call Trace: [ 2394.903491] dump_stack+0x107/0x167 [ 2394.904313] should_fail.cold+0x5/0xa [ 2394.905141] ? create_object.isra.0+0x3a/0xa20 [ 2394.906143] should_failslab+0x5/0x20 [ 2394.906980] kmem_cache_alloc+0x5b/0x360 [ 2394.907879] ? mark_held_locks+0x9e/0xe0 [ 2394.908775] create_object.isra.0+0x3a/0xa20 [ 2394.909756] kmemleak_alloc_percpu+0xa0/0x100 [ 2394.910744] pcpu_alloc+0x4e2/0x12f0 [ 2394.911596] alloc_vfsmnt+0xfd/0x680 [ 2394.912413] clone_mnt+0x6c/0xce0 [ 2394.913192] copy_tree+0xfe/0xa60 [ 2394.913977] __do_loopback+0x196/0x3e0 [ 2394.914842] path_mount+0x1bc1/0x20b0 [ 2394.915704] ? strncpy_from_user+0x9e/0x470 [ 2394.916762] ? finish_automount+0xa40/0xa40 [ 2394.917700] ? getname_flags.part.0+0x1dd/0x4f0 [ 2394.918744] __x64_sys_mount+0x282/0x300 [ 2394.919638] ? copy_mnt_ns+0xa00/0xa00 [ 2394.920501] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2394.921632] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2394.922772] do_syscall_64+0x33/0x40 [ 2394.923613] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2394.924741] RIP: 0033:0x7f9f17289b19 [ 2394.925563] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2394.929613] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2394.931287] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2394.932918] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2394.934486] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2394.936061] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2394.937630] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:39:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:39:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x80087601, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:39:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 15) 09:39:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x8080, 0x148) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580), 0x80400, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0/../file0\x00'}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0xc00, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000440), &(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0), 0x80000, &(0x7f0000000500)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x1}}], [{@dont_hash}]}}) 09:39:46 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) faccessat2(r1, &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x200) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000400)=ANY=[@ANYBLOB="0900040001000654e8b20000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0/../file0\x00']) move_mount(0xffffffffffffffff, &(0x7f0000000380)='./file0/../file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00', 0x6e) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:39:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0xc0045878, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2395.376313] FAULT_INJECTION: forcing a failure. [ 2395.376313] name failslab, interval 1, probability 0, space 0, times 0 [ 2395.379128] CPU: 1 PID: 10109 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2395.380842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2395.382690] Call Trace: [ 2395.383371] dump_stack+0x107/0x167 [ 2395.384348] should_fail.cold+0x5/0xa [ 2395.385276] ? alloc_vfsmnt+0x23/0x680 [ 2395.386181] should_failslab+0x5/0x20 [ 2395.387107] kmem_cache_alloc+0x5b/0x360 [ 2395.388029] alloc_vfsmnt+0x23/0x680 [ 2395.388982] clone_mnt+0x6c/0xce0 [ 2395.389806] ? is_subdir+0x1a8/0x2e0 [ 2395.390754] copy_tree+0x3b0/0xa60 [ 2395.391581] __do_loopback+0x196/0x3e0 [ 2395.392455] path_mount+0x1bc1/0x20b0 [ 2395.393333] ? strncpy_from_user+0x9e/0x470 [ 2395.394374] ? finish_automount+0xa40/0xa40 [ 2395.395436] ? getname_flags.part.0+0x1dd/0x4f0 [ 2395.396608] __x64_sys_mount+0x282/0x300 [ 2395.397582] ? copy_mnt_ns+0xa00/0xa00 [ 2395.398473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2395.399718] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2395.400997] do_syscall_64+0x33/0x40 [ 2395.401845] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2395.402971] RIP: 0033:0x7f9f17289b19 [ 2395.403962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2395.408257] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2395.409976] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2395.411724] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2395.413376] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2395.415027] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2395.416855] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:39:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:39:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x524a, 0x4}) [ 2412.395210] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:40:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x0, 0x4}) 09:40:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x7, 0x0, 0x0, 0x20008, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000280)='./file0/../file0\x00', 0xc) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:40:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(0x0, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:40:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4020940d, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:40:11 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) faccessat2(r1, &(0x7f00000002c0)='./file0/../file0\x00', 0x1, 0x200) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000400)=ANY=[@ANYBLOB="0900040001000654e8b20000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0/../file0\x00']) move_mount(0xffffffffffffffff, &(0x7f0000000380)='./file0/../file0/file0\x00', r2, &(0x7f0000000440)='./file0/file0\x00', 0x6e) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:40:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x142800, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:40:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 16) 09:40:11 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0xc0045878, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2420.828800] FAULT_INJECTION: forcing a failure. [ 2420.828800] name failslab, interval 1, probability 0, space 0, times 0 [ 2420.831232] CPU: 0 PID: 10136 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2420.832645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2420.834351] Call Trace: [ 2420.834900] dump_stack+0x107/0x167 [ 2420.835645] should_fail.cold+0x5/0xa [ 2420.836436] ? create_object.isra.0+0x3a/0xa20 [ 2420.837372] should_failslab+0x5/0x20 [ 2420.838142] kmem_cache_alloc+0x5b/0x360 [ 2420.839002] create_object.isra.0+0x3a/0xa20 [ 2420.839913] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2420.840950] kmem_cache_alloc+0x159/0x360 [ 2420.841804] alloc_vfsmnt+0x23/0x680 [ 2420.842570] clone_mnt+0x6c/0xce0 [ 2420.843280] ? is_subdir+0x1a8/0x2e0 [ 2420.844050] copy_tree+0x3b0/0xa60 [ 2420.844793] __do_loopback+0x196/0x3e0 [ 2420.845592] path_mount+0x1bc1/0x20b0 [ 2420.846373] ? strncpy_from_user+0x9e/0x470 [ 2420.847256] ? finish_automount+0xa40/0xa40 [ 2420.848148] ? getname_flags.part.0+0x1dd/0x4f0 [ 2420.849111] __x64_sys_mount+0x282/0x300 [ 2420.849938] ? copy_mnt_ns+0xa00/0xa00 [ 2420.850736] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 09:40:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0xc0189436, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2420.851802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2420.852989] do_syscall_64+0x33/0x40 [ 2420.853756] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2420.854800] RIP: 0033:0x7f9f17289b19 [ 2420.855558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2420.859291] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2420.860849] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2420.862299] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2420.863757] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2420.865263] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2420.866755] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2420.868522] hpet: Lost 1 RTC interrupts 09:40:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 17) 09:40:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x8080, 0x148) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580), 0x80400, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0/../file0\x00'}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0xc00, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000440), &(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0), 0x80000, &(0x7f0000000500)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x1}}], [{@dont_hash}]}}) 09:40:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) lgetxattr(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.impure\x00', &(0x7f0000000400)=""/79, 0x4f) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:40:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:40:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0xc020660b, &(0x7f0000000040)={0x2, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2421.238066] FAULT_INJECTION: forcing a failure. [ 2421.238066] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.240385] CPU: 0 PID: 10155 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2421.241802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2421.243505] Call Trace: [ 2421.244061] dump_stack+0x107/0x167 [ 2421.244820] should_fail.cold+0x5/0xa [ 2421.245610] ? create_object.isra.0+0x3a/0xa20 [ 2421.246557] should_failslab+0x5/0x20 [ 2421.247346] kmem_cache_alloc+0x5b/0x360 [ 2421.248215] create_object.isra.0+0x3a/0xa20 [ 2421.249141] kmemleak_alloc_percpu+0xa0/0x100 [ 2421.250065] pcpu_alloc+0x4e2/0x12f0 [ 2421.250863] alloc_vfsmnt+0xfd/0x680 [ 2421.251636] clone_mnt+0x6c/0xce0 [ 2421.252385] ? is_subdir+0x1a8/0x2e0 [ 2421.253151] copy_tree+0x3b0/0xa60 [ 2421.253933] __do_loopback+0x196/0x3e0 [ 2421.254752] path_mount+0x1bc1/0x20b0 [ 2421.255569] ? strncpy_from_user+0x9e/0x470 [ 2421.256449] ? finish_automount+0xa40/0xa40 [ 2421.257387] ? getname_flags.part.0+0x1dd/0x4f0 [ 2421.258358] __x64_sys_mount+0x282/0x300 [ 2421.259222] ? copy_mnt_ns+0xa00/0xa00 [ 2421.260054] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2421.261142] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2421.262231] do_syscall_64+0x33/0x40 [ 2421.263024] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2421.264101] RIP: 0033:0x7f9f17289b19 [ 2421.264912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2421.268666] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2421.270218] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2421.271670] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2421.273141] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2421.274600] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2421.276080] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2421.277823] hpet: Lost 2 RTC interrupts 09:40:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40286608, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:40:12 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x3, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:40:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 18) 09:40:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:40:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x8080, 0x148) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580), 0x80400, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0/../file0\x00'}) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0xc00, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000440), &(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0), 0x80000, &(0x7f0000000500)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x1}}], [{@dont_hash}]}}) 09:40:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x0, 0x4}) [ 2421.632342] FAULT_INJECTION: forcing a failure. [ 2421.632342] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.634977] CPU: 1 PID: 10167 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2421.636649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2421.638673] Call Trace: [ 2421.639339] dump_stack+0x107/0x167 [ 2421.640333] should_fail.cold+0x5/0xa [ 2421.641209] ? create_object.isra.0+0x3a/0xa20 [ 2421.642252] should_failslab+0x5/0x20 [ 2421.643121] kmem_cache_alloc+0x5b/0x360 [ 2421.644085] create_object.isra.0+0x3a/0xa20 [ 2421.645105] kmemleak_alloc_percpu+0xa0/0x100 [ 2421.646138] pcpu_alloc+0x4e2/0x12f0 [ 2421.647029] alloc_vfsmnt+0xfd/0x680 [ 2421.647898] clone_mnt+0x6c/0xce0 [ 2421.648703] ? is_subdir+0x1a8/0x2e0 [ 2421.649819] copy_tree+0x3b0/0xa60 [ 2421.650821] __do_loopback+0x196/0x3e0 [ 2421.651851] path_mount+0x1bc1/0x20b0 [ 2421.652704] ? strncpy_from_user+0x9e/0x470 [ 2421.653591] ? finish_automount+0xa40/0xa40 [ 2421.654477] ? getname_flags.part.0+0x1dd/0x4f0 [ 2421.655445] __x64_sys_mount+0x282/0x300 [ 2421.656284] ? copy_mnt_ns+0xa00/0xa00 [ 2421.657168] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2421.658332] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2421.659425] do_syscall_64+0x33/0x40 [ 2421.660196] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2421.661235] RIP: 0033:0x7f9f17289b19 [ 2421.661993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2421.665718] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2421.667295] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2421.668768] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2421.670317] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2421.671830] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2421.673289] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2421.688393] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 0 (only 16 groups) [ 2436.813594] kmemleak: 33 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:40:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x0, 0x4}) 09:40:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) setxattr(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)=@known='user.incfs.id\x00', &(0x7f0000000380)=')+$\x00', 0x4, 0x1) syz_mount_image$tmpfs(&(0x7f0000001480), &(0x7f0000000080)='./file0/../file0\x00', 0x200000000, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) getxattr(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000440)=@random={'os2.', 'k)\xe2\x84'}, &(0x7f00000014c0)=""/4100, 0xfffffffffffffcac) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:40:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305828, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:40:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x15ac54, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:40:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x4, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:40:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 19) 09:40:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:40:36 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) setxattr$security_ima(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000000400), &(0x7f0000000440)=@v1={0x2, "a29be771cb90d1e22a3bc2e161615db12e4b"}, 0x13, 0x2) umount2(&(0x7f00000002c0)='./file0\x00', 0x81421d33da194fff) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:40:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x5, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2445.768653] FAULT_INJECTION: forcing a failure. [ 2445.768653] name failslab, interval 1, probability 0, space 0, times 0 [ 2445.770600] CPU: 1 PID: 10197 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2445.771588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2445.772758] Call Trace: [ 2445.773134] dump_stack+0x107/0x167 [ 2445.773643] should_fail.cold+0x5/0xa [ 2445.774136] ? create_object.isra.0+0x3a/0xa20 [ 2445.774751] should_failslab+0x5/0x20 [ 2445.775286] kmem_cache_alloc+0x5b/0x360 [ 2445.775834] ? mark_held_locks+0x9e/0xe0 [ 2445.776485] create_object.isra.0+0x3a/0xa20 [ 2445.777063] kmemleak_alloc_percpu+0xa0/0x100 [ 2445.777657] pcpu_alloc+0x4e2/0x12f0 [ 2445.778215] alloc_vfsmnt+0xfd/0x680 [ 2445.778735] clone_mnt+0x6c/0xce0 [ 2445.779255] ? is_subdir+0x1a8/0x2e0 [ 2445.779801] copy_tree+0x3b0/0xa60 [ 2445.780344] __do_loopback+0x196/0x3e0 [ 2445.780914] path_mount+0x1bc1/0x20b0 [ 2445.781456] ? strncpy_from_user+0x9e/0x470 [ 2445.782062] ? finish_automount+0xa40/0xa40 [ 2445.782668] ? getname_flags.part.0+0x1dd/0x4f0 [ 2445.783330] __x64_sys_mount+0x282/0x300 [ 2445.783907] ? copy_mnt_ns+0xa00/0xa00 [ 2445.784479] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2445.785244] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2445.785969] do_syscall_64+0x33/0x40 [ 2445.786499] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2445.787218] RIP: 0033:0x7f9f17289b19 [ 2445.787760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2445.790441] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2445.791557] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2445.792713] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2445.793714] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2445.794727] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2445.795769] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 [ 2460.855680] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:41:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x1a40dc, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:41:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:41:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 20) 09:41:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:41:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x524a, 0x4}) 09:41:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x6, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:41:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:41:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) getresuid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0x20800, &(0x7f0000000580)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@aname={'aname', 0x3d, '%-}\xf5/]+'}}, {@posixacl}, {@noextend}, {@fscache}, {@msize={'msize', 0x3d, 0x7f}}, {@version_9p2000}, {@fscache}], [{@fsname={'fsname', 0x3d, 'tmpfs\x00'}}, {@fowner_gt={'fowner>', r1}}]}}) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:41:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x7, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2469.613260] FAULT_INJECTION: forcing a failure. [ 2469.613260] name failslab, interval 1, probability 0, space 0, times 0 [ 2469.614992] CPU: 1 PID: 10223 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2469.616167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2469.617449] Call Trace: [ 2469.617879] dump_stack+0x107/0x167 [ 2469.618374] should_fail.cold+0x5/0xa [ 2469.619008] ? create_object.isra.0+0x3a/0xa20 [ 2469.619730] should_failslab+0x5/0x20 [ 2469.620340] kmem_cache_alloc+0x5b/0x360 [ 2469.621073] create_object.isra.0+0x3a/0xa20 [ 2469.621792] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2469.622574] kmem_cache_alloc+0x159/0x360 [ 2469.623249] ? perf_trace_lock+0xac/0x490 [ 2469.623801] alloc_vfsmnt+0x23/0x680 [ 2469.624385] clone_mnt+0x6c/0xce0 [ 2469.625073] copy_tree+0xfe/0xa60 [ 2469.625586] propagate_one.part.0+0x330/0x640 [ 2469.626294] ? kfree+0x1b9/0x390 [ 2469.626887] ? is_subdir+0x1a8/0x2e0 [ 2469.627706] propagate_mnt+0x1b7/0x510 [ 2469.628256] ? invent_group_ids+0x152/0x210 [ 2469.629011] attach_recursive_mnt+0x83f/0xd40 [ 2469.629754] ? count_mounts+0x210/0x210 [ 2469.630298] graft_tree+0x187/0x220 [ 2469.630903] path_mount+0x1bf4/0x20b0 [ 2469.631527] ? strncpy_from_user+0x9e/0x470 [ 2469.632203] ? finish_automount+0xa40/0xa40 [ 2469.632829] ? getname_flags.part.0+0x1dd/0x4f0 [ 2469.633491] __x64_sys_mount+0x282/0x300 [ 2469.634227] ? copy_mnt_ns+0xa00/0xa00 [ 2469.634834] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2469.635790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2469.636799] do_syscall_64+0x33/0x40 [ 2469.637356] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2469.638092] RIP: 0033:0x7f9f17289b19 [ 2469.638808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2469.641978] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2469.643362] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2469.644547] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2469.645564] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2469.646588] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2469.647612] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:41:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:41:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 21) 09:41:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x81080, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:41:00 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0xa, {0x3, 0x0, 0x0, 0x0, 0x400}}) 09:41:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000480)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x270000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) 09:41:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4030582a, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:41:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x0, 0x524a, 0x4}) 09:41:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:41:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000001c0)={0x0, r1, 0x2, 0x2, 0x524a}) 09:41:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0xb, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2500.088102] FAULT_INJECTION: forcing a failure. [ 2500.088102] name failslab, interval 1, probability 0, space 0, times 0 [ 2500.089924] CPU: 0 PID: 10238 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2500.090871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2500.092071] Call Trace: [ 2500.092437] dump_stack+0x107/0x167 [ 2500.092951] should_fail.cold+0x5/0xa [ 2500.093599] ? create_object.isra.0+0x3a/0xa20 [ 2500.094241] should_failslab+0x5/0x20 [ 2500.094770] kmem_cache_alloc+0x5b/0x360 [ 2500.095322] create_object.isra.0+0x3a/0xa20 [ 2500.095942] kmemleak_alloc_percpu+0xa0/0x100 [ 2500.096580] pcpu_alloc+0x4e2/0x12f0 [ 2500.097158] alloc_vfsmnt+0xfd/0x680 [ 2500.097667] clone_mnt+0x6c/0xce0 [ 2500.098156] copy_tree+0xfe/0xa60 [ 2500.098656] propagate_one.part.0+0x330/0x640 [ 2500.099267] ? kfree+0x1b9/0x390 [ 2500.099739] ? is_subdir+0x1a8/0x2e0 [ 2500.100275] propagate_mnt+0x1b7/0x510 [ 2500.100809] ? invent_group_ids+0x152/0x210 [ 2500.101432] attach_recursive_mnt+0x83f/0xd40 [ 2500.102060] ? count_mounts+0x210/0x210 [ 2500.102609] graft_tree+0x187/0x220 [ 2500.103124] path_mount+0x1bf4/0x20b0 [ 2500.103665] ? strncpy_from_user+0x9e/0x470 [ 2500.104261] ? finish_automount+0xa40/0xa40 [ 2500.104853] ? getname_flags.part.0+0x1dd/0x4f0 [ 2500.105564] __x64_sys_mount+0x282/0x300 [ 2500.106118] ? copy_mnt_ns+0xa00/0xa00 [ 2500.106658] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2500.107373] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2500.108077] do_syscall_64+0x33/0x40 [ 2500.108590] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2500.109332] RIP: 0033:0x7f9f17289b19 [ 2500.109847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2500.112382] RSP: 002b:00007f9f147ff188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2500.113467] RAX: ffffffffffffffda RBX: 00007f9f1739cf60 RCX: 00007f9f17289b19 [ 2500.114457] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000020000240 [ 2500.115442] RBP: 00007f9f147ff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2500.116426] R10: 0000000000017810 R11: 0000000000000246 R12: 0000000000000002 [ 2500.117454] R13: 00007fff6cc32e9f R14: 00007f9f147ff300 R15: 0000000000022000 09:41:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, 0x0, 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) 09:41:31 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x81080, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$9p_unix(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20b009, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 09:41:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) (fail_nth: 22) 09:41:31 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0xc, {0x3, 0x0, 0x0, 0x0, 0x400}}) [ 2524.406897] watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.7:10256] [ 2524.408049] Modules linked in: [ 2524.408452] irq event stamp: 4044139 [ 2524.408921] hardirqs last enabled at (4044138): [] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.410163] hardirqs last disabled at (4044139): [] sysvec_apic_timer_interrupt+0xb/0xa0 [ 2524.411264] softirqs last enabled at (4021142): [] asm_call_irq_on_stack+0x12/0x20 [ 2524.412390] softirqs last disabled at (4021145): [] asm_call_irq_on_stack+0x12/0x20 [ 2524.413558] CPU: 0 PID: 10256 Comm: syz-executor.7 Not tainted 5.10.161 #1 [ 2524.414472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2524.415837] RIP: 0010:__orc_find+0x6f/0xf0 [ 2524.418664] Code: 72 4d 4c 89 e0 48 29 e8 48 89 c2 48 c1 e8 3f 48 c1 fa 02 48 01 d0 48 d1 f8 48 8d 5c 85 00 48 89 d8 48 c1 e8 03 42 0f b6 14 38 <48> 89 d8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 50 48 63 03 48 01 [ 2524.421100] RSP: 0018:ffff88806ce09518 EFLAGS: 00000217 [ 2524.421885] RAX: 1ffffffff0adb5ed RBX: ffffffff856daf6c RCX: ffffffff812fcb1b [ 2524.422842] RDX: 0000000000000000 RSI: ffffffff859a989e RDI: ffffffff856daf40 [ 2524.423796] RBP: ffffffff856daf40 R08: ffffffff859a989e R09: ffffffff859a9928 [ 2524.424735] R10: 0000000000032042 R11: 1ffff1100d9c12b4 R12: ffffffff856daf98 [ 2524.425719] R13: ffffffff856daf40 R14: ffffffff856daf40 R15: dffffc0000000000 [ 2524.426653] FS: 00007f97b0b0c700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 2524.427709] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2524.428504] CR2: 0000562d890faa40 CR3: 000000000f386000 CR4: 0000000000350ef0 [ 2524.429508] Call Trace: [ 2524.429874] [ 2524.430202] ? stack_trace_save+0x8b/0xc0 [ 2524.430769] unwind_next_frame+0x2b3/0x1a90 [ 2524.431363] ? stack_trace_save+0x8c/0xc0 [ 2524.431941] ? deref_stack_reg+0x160/0x160 [ 2524.432531] ? __unwind_start+0x523/0x7e0 [ 2524.433105] ? create_prof_cpu_mask+0x20/0x20 [ 2524.433745] arch_stack_walk+0x83/0xf0 [ 2524.434283] ? stack_trace_save+0x8c/0xc0 [ 2524.434875] stack_trace_save+0x8c/0xc0 [ 2524.435445] ? stack_trace_consume_entry+0x160/0x160 [ 2524.436156] kasan_save_stack+0x1b/0x40 [ 2524.436703] ? kasan_save_stack+0x1b/0x40 [ 2524.437302] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2524.437991] ? kmem_cache_alloc+0x13b/0x360 [ 2524.438584] ? create_object.isra.0+0x3a/0xa20 [ 2524.439218] ? kmem_cache_alloc+0x159/0x360 [ 2524.439817] ? __skb_ext_alloc+0x19/0x90 [ 2524.440377] ? skb_ext_add+0x508/0x670 [ 2524.440912] ? __alloc_skb+0x3c1/0x620 [ 2524.441473] ? skb_copy+0x137/0x2f0 [ 2524.441986] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0xb1d/0x13d0 [ 2524.442773] ? mac80211_hwsim_tx_frame+0x152/0x1e0 [ 2524.443441] ? mac80211_hwsim_beacon_tx+0x494/0x8f0 [ 2524.444699] ? __iterate_interfaces+0x1f0/0x530 [ 2524.445364] ? ieee80211_iterate_active_interfaces_atomic+0x72/0x180 [ 2524.446258] ? mac80211_hwsim_beacon+0xd1/0x1d0 [ 2524.446898] ? __hrtimer_run_queues+0x5e8/0xb50 [ 2524.447534] ? hrtimer_run_softirq+0x148/0x310 [ 2524.448163] ? __do_softirq+0x1b8/0x86b [ 2524.448708] ? asm_call_irq_on_stack+0x12/0x20 [ 2524.449350] ? do_softirq_own_stack+0x80/0xa0 [ 2524.449955] ? irq_exit_rcu+0x114/0x1b0 [ 2524.450498] ? sysvec_apic_timer_interrupt+0x43/0xa0 [ 2524.451195] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.451954] ? stack_trace_consume_entry+0xb/0x160 [ 2524.452624] ? arch_stack_walk+0x73/0xf0 [ 2524.453180] ? stack_trace_save+0x8c/0xc0 [ 2524.453788] ? mark_held_locks+0x9e/0xe0 [ 2524.454349] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2524.455069] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.455804] ? trace_hardirqs_on+0x5b/0x180 [ 2524.456404] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.457119] ? create_object.isra.0+0x3a/0xa20 [ 2524.457776] ? kasan_unpoison_shadow+0x33/0x50 [ 2524.458422] __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2524.459118] kmem_cache_alloc+0x13b/0x360 [ 2524.459709] create_object.isra.0+0x3a/0xa20 [ 2524.460320] kmem_cache_alloc+0x159/0x360 [ 2524.460895] __skb_ext_alloc+0x19/0x90 [ 2524.461469] skb_ext_add+0x508/0x670 [ 2524.461986] __alloc_skb+0x3c1/0x620 [ 2524.462496] skb_copy+0x137/0x2f0 [ 2524.462980] mac80211_hwsim_tx_frame_no_nl.isra.0+0xb1d/0x13d0 [ 2524.463805] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2524.464525] ? rht_key_get_hash.constprop.0.isra.0+0x30/0x30 [ 2524.465346] ? mac80211_hwsim_tx_frame+0xf6/0x1e0 [ 2524.466024] mac80211_hwsim_tx_frame+0x152/0x1e0 [ 2524.466682] mac80211_hwsim_beacon_tx+0x494/0x8f0 [ 2524.467339] __iterate_interfaces+0x1f0/0x530 [ 2524.467927] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 2524.468609] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 2524.469314] ieee80211_iterate_active_interfaces_atomic+0x72/0x180 [ 2524.470173] mac80211_hwsim_beacon+0xd1/0x1d0 [ 2524.470791] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x13d0/0x13d0 [ 2524.471636] __hrtimer_run_queues+0x5e8/0xb50 [ 2524.472266] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 2524.472984] ? ktime_get_update_offsets_now+0x25c/0x360 [ 2524.473757] hrtimer_run_softirq+0x148/0x310 [ 2524.474369] __do_softirq+0x1b8/0x86b [ 2524.474908] asm_call_irq_on_stack+0x12/0x20 [ 2524.475509] [ 2524.475832] do_softirq_own_stack+0x80/0xa0 [ 2524.476423] irq_exit_rcu+0x114/0x1b0 [ 2524.476953] sysvec_apic_timer_interrupt+0x43/0xa0 [ 2524.477648] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.478345] RIP: 0010:stack_trace_consume_entry+0xb/0x160 [ 2524.479126] Code: cb 65 10 00 48 c7 c1 80 39 48 84 31 d2 be 80 01 00 00 48 c7 c7 80 37 48 84 e9 e1 3a 62 00 cc 48 b8 00 00 00 00 00 fc ff df 55 <53> 48 89 fb 48 83 c7 10 48 89 fa 48 c1 ea 03 48 83 ec 08 0f b6 04 [ 2524.481692] RSP: 0018:ffff888049a870d8 EFLAGS: 00000282 [ 2524.482436] RAX: dffffc0000000000 RBX: ffffffff812fc930 RCX: 1ffff11009350e01 [ 2524.483405] RDX: 1ffff11009350e26 RSI: ffffffff816b83d9 RDI: ffff888049a871a0 [ 2524.484383] RBP: ffff888049a87170 R08: 0000000000000001 R09: 0000000000000001 [ 2524.485445] R10: 0000000000032042 R11: 1ffff11009350e0a R12: ffff888049a871a0 [ 2524.486430] R13: 0000000000000000 R14: ffff88801eda4c80 R15: 0000000000000170 [ 2524.487428] ? create_prof_cpu_mask+0x20/0x20 [ 2524.488037] ? kmem_cache_alloc+0x159/0x360 [ 2524.488642] ? create_prof_cpu_mask+0x20/0x20 [ 2524.489301] arch_stack_walk+0x73/0xf0 [ 2524.489857] ? kmem_cache_alloc+0x159/0x360 [ 2524.490467] stack_trace_save+0x8c/0xc0 [ 2524.491022] ? stack_trace_consume_entry+0x160/0x160 [ 2524.491733] kasan_save_stack+0x1b/0x40 [ 2524.492289] ? kasan_save_stack+0x1b/0x40 [ 2524.492867] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2524.493589] ? kmem_cache_alloc+0x13b/0x360 [ 2524.494173] ? create_object.isra.0+0x3a/0xa20 [ 2524.494804] ? mark_lock+0xf5/0x2df0 [ 2524.495313] ? mark_lock+0xf5/0x2df0 [ 2524.495814] ? kasan_save_stack+0x32/0x40 [ 2524.496364] ? kasan_save_stack+0x1b/0x40 [ 2524.496918] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2524.497625] ? lock_chain_count+0x20/0x20 [ 2524.498217] ? ext4_es_remove_extent+0x1fa/0x3f0 [ 2524.498858] ? ext4_swap_extents+0x283/0x14c0 [ 2524.499478] ? ext4_move_extents+0x1a4f/0x3270 [ 2524.500098] ? __ext4_ioctl+0x304d/0x41c0 [ 2524.500642] ? ext4_ioctl+0x46/0x90 [ 2524.501140] ? __x64_sys_ioctl+0x19a/0x210 [ 2524.501788] ? do_syscall_64+0x33/0x40 [ 2524.502330] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2524.503052] ? mark_lock+0xf5/0x2df0 [ 2524.503554] ? lock_chain_count+0x20/0x20 [ 2524.504115] ? ___slab_alloc+0x155/0x700 [ 2524.504664] ? create_object.isra.0+0x3a/0xa20 [ 2524.505302] ? mark_held_locks+0x9e/0xe0 [ 2524.505860] ? kasan_unpoison_shadow+0x33/0x50 [ 2524.506481] __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2524.507153] kmem_cache_alloc+0x13b/0x360 [ 2524.507714] create_object.isra.0+0x3a/0xa20 [ 2524.508327] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2524.509022] kmem_cache_alloc+0x159/0x360 [ 2524.509620] __es_insert_extent+0x3a9/0x12f0 [ 2524.510220] ? __es_tree_search.isra.0+0x1af/0x220 [ 2524.510896] __es_remove_extent+0x4a9/0x15d0 [ 2524.511498] ? __es_shrink+0x870/0x870 [ 2524.512031] ? lock_release+0x6b0/0x6b0 [ 2524.512571] ? trace_hardirqs_on+0x5b/0x180 [ 2524.513170] ? do_raw_write_lock+0x11a/0x280 [ 2524.513812] ? do_raw_read_unlock+0x70/0x70 [ 2524.514430] ext4_es_remove_extent+0x1fa/0x3f0 [ 2524.515076] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 2524.515751] ? lock_acquire+0x1b9/0x490 [ 2524.516319] ext4_swap_extents+0x283/0x14c0 [ 2524.516930] ? io_schedule_timeout+0x140/0x140 [ 2524.517606] ? jbd2_journal_grab_journal_head+0xf6/0x1f0 [ 2524.518368] ? ext4_get_es_cache+0x600/0x600 [ 2524.518999] ? down_write_nested+0xe4/0x160 [ 2524.519613] ? rwsem_down_write_slowpath+0xc00/0xc00 [ 2524.520317] ? ext4_journalled_zero_new_buffers+0x450/0x450 [ 2524.521134] ext4_move_extents+0x1a4f/0x3270 [ 2524.521854] ? ext4_double_up_write_data_sem+0x30/0x30 [ 2524.522583] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2524.523330] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.524100] ? mnt_want_write_file+0x130/0x5c0 [ 2524.524713] ? mnt_want_write_file+0x16f/0x5c0 [ 2524.525390] __ext4_ioctl+0x304d/0x41c0 [ 2524.525953] ? __lock_acquire+0xbb1/0x5b00 [ 2524.526566] ? ext4_reset_inode_seed+0x450/0x450 [ 2524.527226] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2524.527983] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.528728] ? trace_hardirqs_on+0x5b/0x180 [ 2524.533440] ? do_vfs_ioctl+0xba3/0x10d0 [ 2524.533899] ? do_vfs_ioctl+0x283/0x10d0 [ 2524.534368] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 2524.534898] ? do_vfs_ioctl+0x283/0x10d0 [ 2524.535384] ? selinux_inode_getsecctx+0x90/0x90 [ 2524.535910] ? generic_block_fiemap+0x60/0x60 [ 2524.536454] ? irqentry_enter+0x26/0x60 [ 2524.536910] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2524.537540] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.538146] ? trace_hardirqs_on+0x5b/0x180 [ 2524.538626] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.539235] ? ext4_fc_start_update+0xa2/0x2e0 [ 2524.539746] ext4_ioctl+0x46/0x90 [ 2524.540128] ? __ext4_ioctl+0x41c0/0x41c0 [ 2524.540586] __x64_sys_ioctl+0x19a/0x210 [ 2524.541038] do_syscall_64+0x33/0x40 [ 2524.541581] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2524.542292] RIP: 0033:0x7f97b35b7b19 [ 2524.542801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2524.545394] RSP: 002b:00007f97b0b0c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2524.546460] RAX: ffffffffffffffda RBX: 00007f97b36cb020 RCX: 00007f97b35b7b19 [ 2524.547489] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 2524.548485] RBP: 00007f97b3611f6d R08: 0000000000000000 R09: 0000000000000000 [ 2524.549513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2524.550497] R13: 00007ffccec7c92f R14: 00007f97b0b0c300 R15: 0000000000022000 [ 2524.551508] Sending NMI from CPU 0 to CPUs 1: [ 2524.554145] NMI backtrace for cpu 1 [ 2524.554153] CPU: 1 PID: 10254 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 2524.554159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2524.554163] RIP: 0010:__kasan_check_read+0x4/0x10 [ 2524.554176] Code: 66 0f 1f 44 00 00 e9 8b 8c b4 02 66 66 2e 0f 1f 84 00 00 00 00 00 48 c7 c0 fb ff ff ff e9 74 8c b4 02 cc cc cc cc 48 8b 0c 24 <89> f6 31 d2 e9 83 22 00 00 0f 1f 00 48 8b 0c 24 89 f6 ba 01 00 00 [ 2524.554180] RSP: 0018:ffff88806cf08f98 EFLAGS: 00000056 [ 2524.554190] RAX: 0000000000000000 RBX: 1ffff1100d9e11fb RCX: ffffffff81265f65 [ 2524.554195] RDX: 0000000000000002 RSI: 0000000000000008 RDI: ffffffff86795660 [ 2524.554201] RBP: 0000000000000009 R08: 0000000000000000 R09: ffffffff86795667 [ 2524.554207] R10: fffffbfff0cf2acc R11: 0000000000000001 R12: ffff88801eda2398 [ 2524.554212] R13: 0000000000000006 R14: ffff88801eda23b8 R15: 0000000000000200 [ 2524.554218] FS: 00007f4c5f6e5700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 2524.554223] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2524.554229] CR2: 0000001b2d131000 CR3: 000000003ab06000 CR4: 0000000000350ee0 [ 2524.554232] Call Trace: [ 2524.554235] [ 2524.554238] mark_lock+0xf5/0x2df0 [ 2524.554242] ? lock_chain_count+0x20/0x20 [ 2524.554245] ? lock_chain_count+0x20/0x20 [ 2524.554249] ? lock_chain_count+0x20/0x20 [ 2524.554253] ? perf_swevent_hrtimer+0x244/0x3f0 [ 2524.554257] ? lock_downgrade+0x6d0/0x6d0 [ 2524.554261] ? mark_lock+0xf5/0x2df0 [ 2524.554264] ? mark_lock+0xf5/0x2df0 [ 2524.554269] ? __lock_acquire+0xbb1/0x5b00 [ 2524.554272] __lock_acquire+0x890/0x5b00 [ 2524.554277] ? perf_trace_lock_acquire+0x91/0x590 [ 2524.554281] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2524.554285] ? SOFTIRQ_verbose+0x10/0x10 [ 2524.554290] ? lock_chain_count+0x20/0x20 [ 2524.554294] lock_acquire+0x197/0x490 [ 2524.554298] ? perf_output_copy+0x240/0x240 [ 2524.554302] ? lock_release+0x6b0/0x6b0 [ 2524.554306] ? perf_output_begin_forward+0x6e6/0xac0 [ 2524.554311] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2524.554315] ? SOFTIRQ_verbose+0x10/0x10 [ 2524.554319] perf_output_begin_forward+0xb2/0xac0 [ 2524.554323] ? perf_output_copy+0x240/0x240 [ 2524.554327] ? __perf_event_header__init_id+0x2bd/0x610 [ 2524.554331] ? perf_prepare_sample+0x882/0x1be0 [ 2524.554336] ? perf_output_copy+0x240/0x240 [ 2524.554340] ? perf_callchain+0x1c0/0x1c0 [ 2524.554343] ? lock_chain_count+0x20/0x20 [ 2524.554348] perf_event_output_forward+0xf4/0x280 [ 2524.554352] ? perf_prepare_sample+0x1be0/0x1be0 [ 2524.554356] __perf_event_overflow+0x213/0x5e0 [ 2524.554360] perf_swevent_hrtimer+0x37e/0x3f0 [ 2524.554364] ? perf_trace_lock+0xac/0x490 [ 2524.554368] ? __perf_event_overflow+0x5e0/0x5e0 [ 2524.554372] ? find_held_lock+0x2c/0x110 [ 2524.554376] ? __hrtimer_run_queues+0x524/0xb50 [ 2524.554380] ? lock_downgrade+0x6d0/0x6d0 [ 2524.554384] ? SOFTIRQ_verbose+0x10/0x10 [ 2524.554388] ? __perf_event_overflow+0x5e0/0x5e0 [ 2524.554393] ? __perf_event_overflow+0x5e0/0x5e0 [ 2524.554397] __hrtimer_run_queues+0x1ca/0xb50 [ 2524.554401] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 2524.554406] ? ktime_get_update_offsets_now+0x25c/0x360 [ 2524.554411] hrtimer_interrupt+0x2fd/0x9b0 [ 2524.554415] __sysvec_apic_timer_interrupt+0xfb/0x400 [ 2524.554419] sysvec_apic_timer_interrupt+0x3e/0xa0 [ 2524.554423] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.554427] RIP: 0010:queued_spin_lock_slowpath+0x122/0x8c0 [ 2524.554440] Code: 00 00 00 65 48 2b 04 25 28 00 00 00 0f 85 09 07 00 00 48 81 c4 88 00 00 00 5b 5d 41 5c 41 5d 41 5e 41 5f e9 d0 de f8 02 f3 90 73 ff ff ff 44 8b 74 24 48 41 81 fe 00 01 00 00 0f 84 e1 00 00 [ 2524.554444] RSP: 0018:ffff88806cf09a38 EFLAGS: 00000202 [ 2524.554453] RAX: 0000000000000000 RBX: ffffffff87930da0 RCX: ffffffff812760b7 [ 2524.554458] RDX: fffffbfff0f261b5 RSI: 0000000000000004 RDI: ffffffff87930da0 [ 2524.554464] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffff87930da3 [ 2524.554469] R10: fffffbfff0f261b4 R11: 0000000000000001 R12: 0000000000000003 [ 2524.554475] R13: fffffbfff0f261b4 R14: 0000000000000001 R15: 1ffff1100d9e1348 [ 2524.554479] ? queued_spin_lock_slowpath+0xa7/0x8c0 [ 2524.554484] ? queued_spin_lock_slowpath+0xa7/0x8c0 [ 2524.554487] ? osq_unlock+0x1a0/0x1a0 [ 2524.554491] ? lock_acquire+0x1b9/0x490 [ 2524.554494] ? lock_release+0x6b0/0x6b0 [ 2524.554498] do_raw_spin_lock+0x1dc/0x260 [ 2524.554501] ? rwlock_bug.part.0+0x90/0x90 [ 2524.554506] ? ktime_get_with_offset+0x1a8/0x260 [ 2524.554510] mac80211_hwsim_tx_frame_no_nl.isra.0+0x695/0x13d0 [ 2524.554515] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2524.554519] ? rht_key_get_hash.constprop.0.isra.0+0x30/0x30 [ 2524.554524] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.554528] ? mac80211_hwsim_monitor_rx+0x1b8/0x810 [ 2524.554532] mac80211_hwsim_tx_frame+0x152/0x1e0 [ 2524.554536] mac80211_hwsim_beacon_tx+0x494/0x8f0 [ 2524.554540] __iterate_interfaces+0x1f0/0x530 [ 2524.554544] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 2524.554548] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 2524.554553] ieee80211_iterate_active_interfaces_atomic+0x72/0x180 [ 2524.554557] mac80211_hwsim_beacon+0xd1/0x1d0 [ 2524.554562] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x13d0/0x13d0 [ 2524.554566] __hrtimer_run_queues+0x5e8/0xb50 [ 2524.554570] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 2524.554575] ? ktime_get_update_offsets_now+0x25c/0x360 [ 2524.554578] hrtimer_run_softirq+0x148/0x310 [ 2524.554582] __do_softirq+0x1b8/0x86b [ 2524.554586] asm_call_irq_on_stack+0x12/0x20 [ 2524.554588] [ 2524.554592] do_softirq_own_stack+0x80/0xa0 [ 2524.554596] irq_exit_rcu+0x114/0x1b0 [ 2524.554600] sysvec_apic_timer_interrupt+0x43/0xa0 [ 2524.554604] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.554608] RIP: 0010:__orc_find+0x7c/0xf0 [ 2524.554620] Code: e8 3f 48 c1 fa 02 48 01 d0 48 d1 f8 48 8d 5c 85 00 48 89 d8 48 c1 e8 03 42 0f b6 14 38 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 04 <84> d2 75 50 48 63 03 48 01 d8 48 39 c1 73 b0 4c 8d 63 fc 49 39 ec [ 2524.554625] RSP: 0018:ffff88804b7b7290 EFLAGS: 00000206 [ 2524.554633] RAX: 0000000000000003 RBX: ffffffff85747990 RCX: ffffffff819fd705 [ 2524.554638] RDX: 0000000000000000 RSI: ffffffff85a4c816 RDI: ffffffff85747990 [ 2524.554644] RBP: ffffffff85747990 R08: ffffffff85a4c816 R09: ffffffff85a4c870 [ 2524.554650] R10: 0000000000032042 R11: 1ffff110096f6e63 R12: ffffffff85747990 [ 2524.554656] R13: ffffffff85747990 R14: ffffffff85747990 R15: dffffc0000000000 [ 2524.554660] ? ext4_ioctl+0x45/0x90 [ 2524.554664] ? ext4_ioctl+0x45/0x90 [ 2524.554668] unwind_next_frame+0x2b3/0x1a90 [ 2524.554671] ? ext4_ioctl+0x46/0x90 [ 2524.554675] ? deref_stack_reg+0x160/0x160 [ 2524.554679] ? ext4_ioctl+0x46/0x90 [ 2524.554684] ? stack_trace_consume_entry+0xba/0x160 [ 2524.554689] ? create_prof_cpu_mask+0x20/0x20 [ 2524.554693] arch_stack_walk+0x83/0xf0 [ 2524.554696] ? ext4_ioctl+0x46/0x90 [ 2524.554700] stack_trace_save+0x8c/0xc0 [ 2524.554704] ? stack_trace_consume_entry+0x160/0x160 [ 2524.554709] ? lockdep_init_map_type+0x2c7/0x780 [ 2524.554713] ? __raw_spin_lock_init+0x36/0x110 [ 2524.554717] create_object.isra.0+0x372/0xa20 [ 2524.554720] kmem_cache_alloc+0x159/0x360 [ 2524.554725] __es_insert_extent+0x3a9/0x12f0 [ 2524.554729] ext4_es_insert_extent+0x2dc/0xbb0 [ 2524.554733] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2524.554737] ? down_read+0x10f/0x430 [ 2524.554741] ? down_write_killable+0x180/0x180 [ 2524.554746] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2524.554750] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 2524.554754] ext4_map_blocks+0x501/0x1970 [ 2524.554758] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2524.554762] ? _ext4_get_block+0x90/0x570 [ 2524.554766] ? check_memory_region+0x198/0x1f0 [ 2524.554770] _ext4_get_block+0x21e/0x570 [ 2524.554775] ? ext4_map_blocks+0x1970/0x1970 [ 2524.554778] ? do_raw_spin_unlock+0x4f/0x220 [ 2524.554783] ext4_move_extents+0x1c40/0x3270 [ 2524.554787] ? ext4_double_up_write_data_sem+0x30/0x30 [ 2524.554791] ? lock_release+0x6b0/0x6b0 [ 2524.554796] ? io_schedule_timeout+0x140/0x140 [ 2524.554800] ? __fget_files+0x296/0x480 [ 2524.554804] ? rcu_read_lock_any_held+0x75/0xa0 [ 2524.554809] __ext4_ioctl+0x304d/0x41c0 [ 2524.554813] ? finish_task_switch+0x1a4/0x5d0 [ 2524.554816] ? __switch_to+0x572/0xff0 [ 2524.554820] ? __switch_to_asm+0x3a/0x60 [ 2524.554824] ? __switch_to_asm+0x34/0x60 [ 2524.554828] ? ext4_reset_inode_seed+0x450/0x450 [ 2524.554833] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2524.554838] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.554842] ? trace_hardirqs_on+0x5b/0x180 [ 2524.554846] ? do_vfs_ioctl+0x8f/0x10d0 [ 2524.554850] ? irqentry_enter+0x26/0x60 [ 2524.554855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2524.554860] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.554865] ? trace_hardirqs_on+0x5b/0x180 [ 2524.554869] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2524.554874] ? ext4_fc_start_update+0x1a/0x2e0 [ 2524.554878] ? ext4_fc_start_update+0x55/0x2e0 [ 2524.554882] ? ext4_fc_start_update+0xa2/0x2e0 [ 2524.554886] ext4_ioctl+0x46/0x90 [ 2524.554890] ? __ext4_ioctl+0x41c0/0x41c0 [ 2524.554894] __x64_sys_ioctl+0x19a/0x210 [ 2524.554898] do_syscall_64+0x33/0x40 [ 2524.554903] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2524.554907] RIP: 0033:0x7f4c62190b19 [ 2524.554920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2524.554925] RSP: 002b:00007f4c5f6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2524.554936] RAX: ffffffffffffffda RBX: 00007f4c622a4020 RCX: 00007f4c62190b19 [ 2524.554942] RDX: 00000000200001c0 RSI: 00000000c028660f RDI: 0000000000000003 [ 2524.554947] RBP: 00007f4c621eaf6d R08: 0000000000000000 R09: 0000000000000000 [ 2524.554953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2524.554959] R13: 00007ffdad12174f R14: 00007f4c5f6e5300 R15: 0000000000022000 [ 2524.555629] hpet: Lost 8 RTC interrupts [ 2524.690046] hpet: Lost 8 RTC interrupts 09:41:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, 0x0, 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400), 0x241040, 0x0) VM DIAGNOSIS: 09:41:55 Registers: info registers vcpu 0 RAX=0000000000000035 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8229e751 RDI=ffffffff8791bfe0 RBP=ffffffff8791bfa0 RSP=ffff88806ce08d78 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000035 R13=0000000000000035 R14=ffffffff8791bfa0 R15=dffffc0000000000 RIP=ffffffff8229e7a8 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f97b0b0c700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000562d890faa40 CR3=000000000f386000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff8448596f RBX=dffffc0000000000 RCX=0000000000000007 RDX=0000000000000000 RSI=ffff88806cf2ea98 RDI=ffffffff84485960 RBP=ffffffff84485960 RSP=ffff88806cf09558 R8 =0000000000000000 R9 =0000000000000001 R10=fffffbfff0ace161 R11=0000000000000001 R12=ffff88806cf09638 R13=ffff88806cf2ea98 R14=0000000000000000 R15=ffffffff84efe600 RIP=ffffffff81fe3f34 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f4c5f6e5700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d131000 CR3=000000003ab06000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000