0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 2084.111043] 9pnet: Insufficient options for proto=fd 22:58:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b954", 0x4f, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2084.345981] loop3: detected capacity change from 0 to 135266304 [ 2084.349691] tmpfs: Bad value for 'mpol' 22:58:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 22:58:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x80000) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 22:58:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) sendmmsg$unix(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000300)=[{&(0x7f00000000c0)="59a296715d79771f7ee4baa8e2a90546c6381553a387c0d7b4429ad7e052c5cf5dca285d0de5312910cf08b08cc4936d0f9503830353260826443e93aee4de541b40c0187633e0627d7558cbd8cce3", 0x4f}, {&(0x7f0000000140)="bc07a57215c832439f37748f97426fe8597f4b976d589e278aa9cfc3c4302f3746befcb79aebbbfd9e5a6097f7c46d6ad604d49df1f41681587093485a351513b47a5ca9aa88b54759abbf3b78fb7855c7a1ca53537e4b2a29c0faacba54d4d995022beaec3e12be7a059232e446edbb3f5346c5cd939cefb4fe5d2cfc15e1995d45cdd3ab52e479ebe9c96d2953", 0x8e}, {&(0x7f0000000200)="1ef122feabe16c8e189f35c8568bb6cb33ee6406c77659e26fa6a0e6bdad8003649baafe6c55f7f929826b91e25374d35d955175efc3c6e0aed55b3ca5b17bbb157b6a12c84090ab1b7c61eb63b1f40bca066ca9215cde2aa179324994a54709b60548f6c022346aaa777b389355d78e8cfd78e6e202c1e3aaef02b539a5ca6b96da5a5e63e70e80750f891aa5ead7f9e30a52c89915f0449a7d211bdfec194cc9c8cdfa3a448fd0b96485e0e3a6c364444eff2cfe1a44a79875db4457667e76fa7d56ac17a886a4c9e303a8349ff11f61caf88767ad009c5652e510be7fa690b6742ea581f1", 0xe6}], 0x3, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r1, 0xffffffffffffffff}}}], 0x20, 0x800}}], 0x1, 0x34) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000440)='./file0\x00', 0x6) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) 22:58:58 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 22:58:58 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x0) 22:58:58 executing program 0: bind(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x2, 0x6, 0xfa, 0x40, "e38d50fc671f31586dab1a3fb5b196b253c518aad4d473e60da8a7b3e01f2ed1468751d82264c4cd713582d659f29792105d9af11bee7175a7762162f0da29", 0x3c}, 0x80) r0 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x204}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x40) mkdir(&(0x7f00000000c0)='./file0\x00', 0x8) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x10000000) 22:58:58 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 22:58:58 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2100.635765] loop3: detected capacity change from 0 to 2097152 [ 2100.641592] tmpfs: Bad value for 'mpol' 22:58:59 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x9}, 0x0) 22:58:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 22:58:59 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x200400, 0x2e) perf_event_open(&(0x7f0000000640)={0x3, 0x80, 0x1, 0x40, 0x8, 0xdf, 0x0, 0x0, 0x1000, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000005c0), 0xc}, 0x2114, 0x8, 0x9, 0x3, 0xffffffff, 0x3, 0x66c7, 0x0, 0x8, 0x0, 0x3}, r1, 0xf, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x200, 0x99) getdents64(r2, &(0x7f0000000500)=""/156, 0x9c) ftruncate(r0, 0x7ff) r3 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x4, &(0x7f0000000400)=[{&(0x7f00000000c0)="d1479f182e142842486411c17e4128e51b35851552a2d4531ca45e3afa09b894f530819a1bccdef1b224a4da2549a134d451e204dc28fc4756f8b5b7dee13d1ba89f8780c3b6e18ebae56501d9b61b530e8020e3c602579106175e2f702a827d976c709b1231326d2531925135aa9595b1c00d8517c67f5aa251b237acf07f9f579304b8fc02671a55d226168e8b85334946d5e5af7eb3d470194df5834cdd45d2897bbddb5e06c75481ad88619dd3e46848211ff3558e0a4444d5e89f8a20bbe5c3a52ddf84b7d68188f9f2b6c887fc26df1e32fb59c2126bf88f75", 0xdc, 0x81}, {&(0x7f00000001c0)="48db3e77ff4b4d30a58d7febb544f5a03ba2164cea36a10ff61cd1c46424756e8d0ee23607c55ea41bbc67e6e906cb439a324b35aecb8a353634ddb590733e68baa55047d072975858a50efd958618dd025300173e5e6f0999462fff10653f2929be2e86add3214abad87b99ef0e31e297d22dd26a4137152586f76692fa0985068a7093dd4bc8063fe68649f98e056ba215a0485fcd8b73041613d826fcd177f55a19248fc7f6c86b777d6ad4cbc20518da393496997d915488d43a42e8b9b843319b231fd98ca5a7a35bfb361f11be0130", 0xd2, 0x401}, {&(0x7f0000000480)="bb77be085e18682ff5c97642df6589c528d0ed4ff4387ff5ac8737dc35ee91174a49ce495016756726c22b44d529543970af4016364204785a6dae97314ee53a11cc912cd829b169f19310f58151501d", 0x50, 0x5}, {&(0x7f0000000380)="643be1838f393a3c96038649ee257185e8ad898b78fc5060d4741b5c26305d7b3f2cfb5c596f1ae02483cf8791505178c41cf5e7389a9775d3bab8d7a5bba6188946ee2864e1ea97aac339073c450bda1b91e42bbf783d0ba12ceba74dac5959a614f11746d2bed4dbb7cb93a9d24994c8c5ed39f3d51439eb65bb", 0x7b, 0x7f}], 0x808, &(0x7f0000000b80)=ANY=[@ANYBLOB="687567653d6e650bfbfdfb8da898890137737665722c6d6f64653d303030a430303030302c73697a653d372c6e725f626c6f6e725f626c6f636b733d342c676964000000000000800c79c2948f163a78012bda0a9ab58ea770132e09b20fda919fe8ec5e6e280478ab3bb55f9e5049ab22cf298c0bb6d912bf56e03ce186814bb4d22b48bd56e72bad8c7b8e5ce7d2cf3ec85d2488d86e1578e0620552360787acddb65c9ae5644a0d0a9d8d884c0d4ce69e89a1581f59794c7702080709e9a293ea095beb2a83938886e8d82da515cf83a729c7f17293fee7e5ab3a", @ANYRESHEX=0x0, @ANYBLOB="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"]) openat(r3, &(0x7f0000000600)='./file0\x00', 0x200200, 0x180) 22:58:59 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) [ 2100.880553] loop4: detected capacity change from 0 to 2048 [ 2100.883115] tmpfs: Bad value for 'huge' [ 2100.926483] loop4: detected capacity change from 0 to 2048 [ 2100.937070] tmpfs: Bad value for 'huge' 22:58:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="1f00307af4d8e9b44f156a0619e3df910fa1e492d66b5af51843c6fe68c17e254b39146488e4d6f460da2d17cd939193f4619c26bf2966656cb043728a0b35c5e586ff03aac23b", @ANYBLOB="809e4e8d6cffe3b430714ba91ed2a11837126f224911da8bd0949c0f7d13bbfc7fe4d8650a0f93a152d2593579df55598862c4385c88c5547019da2fe7adca6e728ea8f994e65dfbe30fab05279ebfc5268187a8811c0977118c193219c37317b009917e845f9d4af8d7", @ANYBLOB=',\x00']) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet6_int(r4, 0x29, 0xce, &(0x7f0000000200)=0x2b22, 0x4) sendfile(r2, r3, &(0x7f0000000000)=0x404000000, 0x1) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r5, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r6, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}}) inotify_add_watch(r6, &(0x7f0000000240)='./file0/../file0\x00', 0x400040c) open_by_handle_at(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070517a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f7980f2689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a27ffd74255ef37a00"/236], 0x420800) close_range(r0, r5, 0x2) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2101.000688] 9pnet: Insufficient options for proto=fd 22:58:59 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) [ 2101.079844] loop3: detected capacity change from 0 to 2097152 [ 2101.083011] tmpfs: Bad value for 'mpol' 22:59:15 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 22:59:15 executing program 6: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@updsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x40}}]}, 0x13c}}, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r2, &(0x7f0000000000)='./file0\x00', 0x402, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000001e00)=""/4100, 0x1004) 22:59:15 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0]) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 22:59:15 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000b80)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "5fabd34a60e47f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000580)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x0, "46da9200"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000057440)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}], 0x0, "46da9200"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058440)={0xffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xec, "b935eb35f4ff9b"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000059440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "8f7121dc77e63d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005a440)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10, r13}, {}, {r18, r19}, {0x0, r20}], 0x6, "4f623c6ad6eb98"}) chdir(0x0) r21 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000004, 0x11, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x6c75, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x402}, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r22, r23, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) r25 = io_uring_register$IORING_REGISTER_PERSONALITY(r24, 0x9, 0x0, 0x0) syz_io_uring_submit(r22, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd, 0x11aa7d53, 0x0, 0x0, 0x12, 0x1, {0x0, r25}}, 0x6) syz_io_uring_submit(r21, 0x0, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x2, &(0x7f0000000000)={0x77359400}, 0x1, 0x1, 0x0, {0x0, r25}}, 0x4) 22:59:15 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x60}, 0x0) 22:59:15 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r2 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r3, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 22:59:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 22:59:15 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xd0101, 0x8) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = getpid() r4 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xd3, 0x87, 0x9, 0x3d, 0x0, 0x4, 0x4, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x9}, 0x0, 0x0, 0xfffffff9, 0x8, 0xffffffff80000000, 0x7fffffff, 0x7ff, 0x0, 0x2, 0x0, 0x3}, r3, 0x2, r1, 0x3) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001700)={0x0, 0x0}, &(0x7f0000001740)=0xc) r8 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r9, 0x0) r10 = syz_mount_image$nfs4(&(0x7f00000018c0), &(0x7f0000001900)='./file0/file0\x00', 0x0, 0x3, &(0x7f0000001b80)=[{&(0x7f0000001940)="9fa11c5b3f2ec707f94c135caf030ef46f04621d914cc573fa07c1c7dd886a6b8eb6f9c9f4f03ff38cbdf168b31bf70deeb147acc29edebcaa5f51e5bf8b1266f0ffa4a0b8943100227d8ac258941def07f705bd7ce1f9c544664c09534e7ceb51ff54a2ea93b2539d8cfaa4d372173b5c20abac75e867de39c0919910a230f9e6a2e8de3cd35e7c4890e4f90ac18cd7acf8a37205cecd0b64b250d61a2efd4ab72a562af4f55f171f9cfe9b0b901773c4d3d730d01a51f09a4fceb2f3b6b4190dea9a5ecda32519005581bd0b72bfffaafa4517e849946511f2d0e20df0735d411cd5dff12c4416cf42d05ce71d8a901e5ddfe0dc1f8d", 0xf7, 0xbe5}, {&(0x7f0000001a40)="5c5a7a6b29ec242a224f5b8d", 0xc, 0x3}, {&(0x7f0000001a80)="c4c0fecba3f896ac0b089388eb4a33742ce7b77cff9475a9b98a5640d213e457c2adf75e0c133bf18bb432521b9b292d0b92625d316dc1d72b2912a167a69f317fdfceb7b343783411ef1bb0e080f9d8523116ecbd99f1b3f9fab3fcf617b64d9c090469d503f8fd9937cd579aaa4bc673cd8f4e1e786f1e677e60119392c391ac97365696e8d84df543c39342b3ee71335e5d22d0f73dfee4183786b0aabeabd03e9fb6e3c1631824cba8aedc58b803ec41c294f1d9b03db0a7938f76d77559ef3c6c18a0411f8e30aadd6aa8f1c35c904c9dda1bb9d027", 0xd8, 0x2}], 0x800002, &(0x7f0000001c80)={[{'/dev/vcsa\x00'}, {'/dev/vcsa\x00'}], [{@smackfshat={'smackfshat', 0x3d, '['}}, {@fowner_eq={'fowner', 0x3d, r9}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@obj_role}, {@uid_eq={'uid', 0x3d, r7}}, {@dont_hash}, {@appraise}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0xa4b7}}, {@fowner_gt={'fowner>', r7}}]}) openat(r10, &(0x7f0000002e40)='./file0\x00', 0x220400, 0xd4) r11 = dup(r5) fspick(r11, &(0x7f0000001780)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001840)=ANY=[@ANYBLOB="0100689e876716055bf3000046b5a7dd56323db0b2754fa9970d94123f605a294419092febf61ac805fb10b3b922236764dbce108c12d5a77d966085199baf22746b99b6186fd5e42c9a5f9982b0e6", @ANYRES32=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='./file0\x00']) sendmsg$unix(r5, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000180)="c3620a584a9fa3b30e1a4cf8589f91daee2a057158c7e0cd693902413cd81c4451ca8883ab951a2e5cb09f0c4f6f8e79e42ecd161906905d38509a1b081dd51f7e5433ab38576f96957c999de067c46c27aec70f5548956fcc840b861fb3d9bcf5ebf71c867efc26378548cfb96c7ddb931fbf850faa491cbc127b7e8e3314d907af09254da1fc94e346f543226ccfb00968f4d3e3fabf012ac3a640170a748d6b6b667293fc1499f704c2877cd351f0ce98deaaad271d44f07b16fbc5af43445ee6eff52cf9064729344853c106d2a6b95a7982", 0xd4}, {&(0x7f0000000280)="6539a9404c6c09b81ec3556529554a103519c45f41694190ec9b18055c31b4df3dd5497632f6f8dff90340061fb9ab8d5c9da210d3272b97d4fa03389bd4c55d6a73d7ad3ec1a36de57ca6c653c8b2e8e3c863e9858814d8cdc8ad84e8c1", 0x5e}, {&(0x7f0000000300)="615ae660f2821eb51ce3d67d93394d5049a3086118b7dad6a8a1866aaf8022d830a3c6f29d281f5f9c0540fd0162", 0x2e}, {&(0x7f0000000380)="a2f27fa86d4f5af969f4bf335d6e16ec4aff776095cab034e278", 0x1a}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="13987fd33678530c6f3b4b050a42e25aa9e75e076e7bd76d5727a3a05cf046e88829c0cc32b6ec849619e0cdfd7e0e7737cea2f89e15d430d597ac1f8b983c351149b26d0ccb788e696b", 0x4a}, {&(0x7f0000001440)="1f2902b64700ab30ef7584248069c3691ec9e08b0798fa10a12a3013f2d2ba5f874f243b0c837a16193286f3d92009a6025ed2f866ecf6d9cd8af3de0f5ad591cc996b9a15a3fd139eceb7f4e923e12ed2724959078e6df0df3ba1388345653a4c8f21da3cfdf7a5d1e7510737d960f064dfe2265979874fa9af84ec3344c380ccccc5982b94921589c188f16dad1c9dd2144fad6b5b6cfb3aad2420a4f2f7a462111b8eee1b1dedc774fb6229f134802a7e8ea9dae68034f3b9b315cc8b641ad6c96588efb0daa8871a9f0e9c71192da8238d6393da47dca5c0e52e4417f1527ca22a", 0xe3}, {&(0x7f0000001540)}, {&(0x7f0000001580)="7f1dd67354a25034977364da850aeab2900e85b21c653f546ce8655c88b020cff0469b99fe6e492a0b63405fa5cca3de99722f66c006064d8fb53b501e1f4a3112aa89c9ed1e3c70af48bcf79233f7d1f365bcbc086d2279e661ba5938ede1a536ecca734457743fd631382ad9135685a4aee61a6432f93b07fea7b991ae846ebd056b87efe2f2f33102d109c53d5e94e65b04cf79e7ffcceba32a0144e4bae39f08caf57094b27d4b90f9e3ad86ebbb2a14342f6e05bf7c64a3aed0422774", 0xbf}], 0x9, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r12}}}], 0x40, 0x14}, 0x4040) getdents64(r2, &(0x7f0000001540)=""/12, 0xc) [ 2117.545868] loop3: detected capacity change from 0 to 2097152 [ 2117.549372] tmpfs: Bad value for 'mpol' 22:59:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b954", 0x4f, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 22:59:15 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x99}, 0x0) 22:59:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdn]=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000000)="1f", 0x1}], 0x1) 22:59:15 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001700)={0x1, 0x80, 0x0, 0x3f, 0xff, 0x5a, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4fe4, 0x2, @perf_config_ext={0x7, 0x6}, 0x14400, 0xfffffffffffffc00, 0x400, 0x2, 0x0, 0x6, 0x6, 0x0, 0x9ea3}, 0x0, 0xb, r0, 0x3) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) r2 = syz_mount_image$nfs4(&(0x7f0000000700), &(0x7f0000000040)='./file1\x00', 0x8, 0xd, &(0x7f00000005c0)=[{&(0x7f00000000c0)="ab3ddcfd9027c76bac189144bc09e1570d6551893aae705e2faa7ae5501037337c26de9759d421ab31e21332cb8b48716a522c23a2881c00904d61038985044da83f82923d42dd65368b3c0604ce87042eec541ffb558273c0e0e1a079325eb6b12c4db8b4a9843b294fbd8189624c64c82a5e57028d6c90eb561295595029bbbb624c9d5d1f75c577a58d6411495f68f6ff2ddd6d96f6683ee09ae21448df40d07b36e5af5b419850368626812655f47a5a078a6c724d6d9485300e88ab3f60cd3e9be249b1c01af1f30b20407b3e8c67b3aa8000f270363eea7eefe3fb3d79a7", 0xe1, 0x100000001}, {&(0x7f00000001c0)="6f61285f265cc79f5e1389c09b72ab30cba8d0d5e8b7ca71dc94a4a569281a5992a437559647a458353a09a462b9f7604be35f", 0x33, 0xfffffffffffffff5}, {&(0x7f0000000200)="a770478959bc1b4cf7b069b25bf4964b9c4c55bc21fdc4134b8420c49b6918e03b7ad0fa8b005ef9a03c52eab243eb67413bdbff6e5894a1ae1a4e78fb7ba33e74c4a1db3f40f2340cf6f0624962a44e9d81d1316d1250c43d51bd9726888128f9ca6a75038d9945040ed58bf90102801e838eea434d3c406902625537c1c2ce46463419e6742958ecbe39300ce74e85f17acfc9fa13f0cf73e9b185c6f7e2a526427582df2756e11971ad4d537d1f59731dd490e23f81a779a023", 0xbb, 0x7ffe}, {&(0x7f00000002c0)="07f2dc35c5ff158a721f3e57331afd62f6099b7004f237cfebfade8f", 0x1c, 0x100000000}, {&(0x7f0000003e40)="b1fb0f96eb4a8462b03fa9a97cb003e3df2a64a0b644e535e85566b436eac75e937a5bd5cf7999fce983a44a796e5dd0fa8ec9fa42bc9a113c758ddc05897956ea0e45db407a0c5f9c4a0c5ef04110e982e790c6afd4122fade7f390b2159d820528b3c984b651afd2f44b552490036c3f721741e0bc786f48b2b3449fdddb0caebb10c34a2b0a44fa5bb7d706171f4a51b7150d8b3e455e84ba192749510ac86e304ea957bd1751ba0714fa87ee5bb7a26f667ec59bf70a2da41e867b9d531bd7b2dce31ef96f11b62dcb957580a60bd42c0f99f1db3fce3894791e4651ca07e297239632f3871f0f7b7ab6ea07241405d090c058cf9999cc6a33e81c8bc1c6f96c91d7756650dd81dcb6606b000553b07e3aab7834fc447ca233b5cabc2c416f46dd0fa2a736556b2640e4a419e605d73aea936d294fd298b9b613aba1cd832dc12e270dcb7c3684e7a55985d55e610db4802170e5207588b7a49f032896a7312640c500b97875e8a4483e74126cd19268c97a793f5ec1f75c4d08707188b3d5f2ce0bd82b58c5c504d3b108b2295f2d725779db2a678514f5e7b73500b75c9c3b6959f9f37f8139832872bbebff2416e62bca4d9632dcf2954754ecbbfa51a805b9c922143979db5e1131d740daa4d86fd9646546f33a7c2c30582ebb84b5e06026119c71fac25d23d8c65a87bacd6937cee558013ace532862efe042f3e34e36dd770fddc11368956547d9ecfeab777e3389b91b8d935203bcddb64d197600fed2b7cad2a719190d8573367135cc65d89b6300cb4e73ef872e33c1d9dfe51a62ad0ad2c55d69cffaafc0ae1ca6c0bbfdac28069ce0c366b3441db39826105d1d4b6c6cf447d1b531602050060c76d295c6f709e6ee60cb4e587f293c70004bed3e99f4123c47459ba6c776ce4282429fec10c7723d943a53e1d93a8209136e734e98f4e88a03d02153d8f945ea3a442c01182d0c222c692d14da88596d054cc9b0b0809e4505d13eeb6ce5ef273ac4bf479a859b84812b8fa3b10fb24c895fe83223906f8bee963303376f4d05d56cf56eb14fe2d07e7d764a2218644f29fdb8e125a27052f5d66822e9dd3bfa9652b4b4a21307e7eeb8871be0e52c07d55d53625183292c44c01d99315d5c58eea31098c3920aa1e0ae922bccc401791764886ecd5788eb5def6a3e183ae6eee5b6ab2305d96b5e29d303e3cc4b70e3a02c4dd4218f577a619f1d13b01db8ebd78f97c8c3a16939c474e8e62add7c477cbdafa4699f3f3b59870b33fc981042483a3681acc243e5d401fbae526944526f4470c6f9dc44a9c17cdfac66ae99e416c8ef95be7d145d12ba74c0570090ed1b6084f202d2a5810ad1b16c89ecf42a006e154429f0de603c611e475bdd6ea2fd2c93ca1fc6dd604986fe41ac6439127afcb7620e4df7f59fe37deb383827a9a211d54e67a5cf640a01a5e9050d1889650f29832ebbd54d458a1dbd0ea4d78da39b0c7dd6b74c80c34dc9b8f221bfd1e04537b8c7977763a970f176c7ece112384ec92134358dcdfe04865985537fcee24f326ec7ce92573f8651591e5b2ec93c1b932332e29b7fc6be384bbdb8491b5a1e5fd68d3c1ceacc655bfacafd362fecd5614f9296498252d1f95b1d9c1348ad545813a535edb32be1b53ef4d678f55dabe740537120acb4cfb0bb5d6f0f040d6df098cd96bc070f75c1fd5fffd5a94133135b02b3c5e613431b95105d0d06bfb0277cfbe9c0064c59293095c55df475eeacae383b2c26a5d708e5be2a20f1e59c19a3929203719b9c67d87c2e6d4c81ed4a4f56f6d7fbc5c13755e57e2262edcf13ee7c74c7fccd37157f715f7b1dd62fbfd904cd00da1e83758aa2fecc115262e3a602723bceab53f17ac7a56d4931c9775a48372265fadd7328e614f1b77e2ebc7b7017050b4a754fa871eaa3a8cb9b3058113721872da7a83a365a56c41cf0cf363639ca8a374eda1930eabf1f79ae80b05ab76960aae9fe8c58275524d2fc6d24e29d372931e4fcc6201e152aac36c3266b2d204ba2951fcd79dac45dac08ceec1abfcf4980b8b37c06cd52af315a41122824101ea72c89711a17eaac39d9fcd7fc6bec895afb2a46738ca589c36f55911b3a241a8d588c26c9a507a62fac6f59717b200028a1855a4e037c903555631380d63bc4ee7b49ce8615128415718209cc6b54eab63a818e56756b3dc272c116c121f5d2cd7fa39f6c66897b8cec73e8c9e32e3d3b3ccbd16711a1ca3ee52d026cdfd38555aa959dde00b8e845e82b86a83f2cc24878c8ac610ebe94c9547d2420407b100cef5e55b58a7309b7f41e5f13e68466124b64b7df0ee8f960286da6ee83ba8ed70006cc3bf0bb9f64b1674848d11b12d09b60c6793a398e729c1da2596f6a352eb73e821a9fedf879dfa48af4fe8460d1f4ee3e28a7a401783f2b01cfb53e9608b904703450e9adce9131cf4f440edd840227536f5147d7819a288e6d45ed3e5a535747e386d552dd1c83fac608ee4ffc429680fc429b645116ecc3ca9128d5d0d85ce3c95e088afd26ee30aa3dde4b3aaf78a8cd5bbf54b729cc84bd9251672dd1d092eb637c2beeeaeebcff8127422bf7b03964ca5bff69389bab23f60ad314432289fb870286665789bf946f516e22bd8211cc4b4d39d59037817c803bf28380ceae2a8370ac63dc43f998e73c4947226fd0b430a84a3976ce222c14c0a2ea87d507b6ac203a5b43ce7018295265e2c97bce72a93aec68dc0bb0806b3715ef44c446db6bf1b8bd2f178eb95f7ab4aa7d60b06cbd47b994aa37b5c11585b2077a2f25987e6bc0f14876623b9a3f75e4e2d3345af46f635b4f428c86b9a5b9c6838f7f7ac47519d3efbf0a2ba46f1f2357197765f9b18288a042ee27e65491e51b10105bc19f476d200306829adba98e835463b01c0e39e53f391654ba5b8578c32092c0b808f92db400c9f0a91bab635718431e90ec409a437b0af7239cb59ab71e7adf6c708aabd9910c2744f732749a9e718d781837dbca6a0a96d0343fe96b8b0927dfcf63aa589a04edd16af12c050f242496c1331e25f2041a8db90ac9ebc1dc373dac3436ac5f98055a51fcdfb5593d1957765e2088463b4febafa710776659cf2a917fd59462b4efad2e808eb8f1255499ffbb0c3a5337ce356f87a309d2163ae0c7ffaeb2094b9b467c98fd6c320f338078cbe85fee64e5f5291776ebaf0e251693d414c3988a5da2cc7655264909bab453e8b5f191197a95d99ed762d9331752f22b622d2a37edac462585d35939b7ffc218879821d3bcc031e46292f489b39ac9dcca160e895b6398e0889f178fe3078f8a9356426e0fdee876ffba9efcc9f4e3ca5d1d3e4213e57398f731381bbc7bd0c1a1979c5c9e501ac70ad17d68d09502155ecafb1447741b6fee61145965e734878c77dd58963e3898c3fc97fb88a0c1af1e0de1f18642cfe5027a2526a6923d156dd158838e0f2e6640023f55c51bddddb6aa48daaaa159d164928833a51d6467100c16de342b9fb1005c671ba9c54663975033eb1e0b7eb7aa13d98647e32a00767cd536605ce96620d374e8bb54bbd30fb7cf078e375b0be0f1ba21b75f03fcb0207318f694b7bcbb196d2474ab6c1017cd7f4b79f54a841b371246f15f0b86d599e3ec4d735e4e9fb5f9f2b823c0b460fefa5d6dfc3616c736c64e7d22fe252c0da39542011c5e63181f92545921637952616e137ffd0cce183204f57b766c6b9f0c6628677758b3084193dc5cc33ee1a49e1ff67af9a84b5f342e84decfe75497e04fcfa2fa93330ff3d4116de0613b8d41cd02b2e99bf0dc40b68b75e15cf39a18d91522f76a9c21f40592161de8efffde80c78541a300df73cccddd53b9a721b4dfaadfe0423def9caf1375800fc0ab1103af9f1cccb70f808bb26af865888a544e79d81648a26cef11c4f31760acd614db91b259c91c79108d3f32b3dc5c55f21ff23dde6b82474b894c48dfd89112d463c624144575ac3fc1be7467794a6b044e80e87cee8dee4e4d26b85eb938dfe57f32c90b5cbbd1c42d7230efa8144e63e0529614ac017644ec6511f612e8c49800370f777185ac21d947a841d7540a6cdb04ed1dd46ea84c4957e8a6d99996d7f9126f8cfd2c0d41f8939f744bd603775adf285e5c3a3fe8e7c84dbb9afe63203cb3678382324a9fd7dca1f773b77efb51acea28e8568fd809aa6f3f3e7931dc2bbe88baef9bd43cb18063d8bf808c5c7dd0e24d4c747d474461cff2b183a236fb53c64ecfa45148019647fc0c869d03a741e837dfc84e0a082c731a16726a7bda9149be19c2c89296a3010985320559a2ebbf1899cb5bcfd6a91d106986a4309dc04c0f43fe0a7bf0a6b0b0efe5a7f1088e65d615a1dcc8e98605d7fec97e57235affa026016775953051b9d5360e1645db1c302b3030ba80812e03fe60e355f118aea1f59ebc98fc4b680ea6335bdc8e95efcc328bf2d19685b3b859a4d456e5d04f71390c81ee3da8636e7b727d82256c71be2cb226fff91c5353d549d160e557153e2692018e660ac773e7a7a1f8633dcfc6e69a52ddf430fd0470c618ed0ed0a9f7f7018993ce8421dbaade8697049336e16ef7dc68190d44a1ba641fab53f7ca8a98aba8abcc2230b7474964f2069e4e5982df98255a6e77a83899c86b05592b8427bb0805967d0dd00db08b4391fd88b35a3ab6cd25adc1eaf884118521282d6218783f279cb3fdd6b88b3a83db7da18f4c329aba8e6627bf709af6aaa1a7ab328d2522687a537f6a60891dcdd1fc70474393f178398848b265ab4ae9a7f735e54ca540bdfab3340a5f545303482ff719233ce946e5442a419fb907bea2b2aa3541dfcbb4900aec2c03c5a822d6cd4d3dfe275ace15f6071da75b57fcb5ef77ce7afe7753722a0bfc6724adb2b37c6bc2409cd7edf37701da5bab3fa23072b5414c93bc2b249c72d5597b32f4f2fbee7d669f4ed2ebb62bfa7541b57faa741f330e7c39d5fbb9828f78bddc7a8a7b5626c4d79490741adecab5aa69a0a66e21d08ccc7e6f02fb66ea60b7951917f08214dbb69412af06bd4b4a3e8cb6021ab7784f2f77684e8885806b84e08e56037579d795c083896ca6ae5a5bc136d7a1cc71339d7b9b51d56234460d9e9dec89df8afadc2f2b94ee6d96ddca04f85e1aba8a090b25881c3b91cde46b04edd4670fceb0a874166717c39e900485f0c4953e3a172eb8daec95f4192646aa104d0889c0d71ea7b43b95e2ebf5811ccb7cd66e733f659cefff66afdc53b5719dd8d11fa3feaab8f7d4a02d095c4b799eca621d6060fc35d3385c86a80db688cd381f3ee8cc3f6552b1d754cb792dd117c4416c278ae78e8c7b4e25a76df3c3dbec1b334ce6347b32f14f0c57d94a1ec1d1a0b97cb8c665fa9b3b8dc67257a2cdde7535086bdeaa739fff00d7b179a4a4e9c1e77916644a6297d1e2682ad0d6914938fc256f2c989176922a3fe58a2f3386208d0e2580418da6ba24edf7be4ec7d425fa4e50cbc3d50ac87e9bce0e79a3f7180e074603e1c6a9a2be7b46680d96f5e7ce15c4c0d84b35dd268a52f6f0261501c92747efd011ca64ee7b29cb88606e66258a6db2e84740145565b41cf14bb8f83a17e5f9862108baff4274134eedc8ed1db10730ded677481915879e9f19950db66c483f67b2ab09aa8d5eaf4fc2cdc27b419d49421a18639d256114752b80e25480c797f4f55c9d0458912250a8e5117e6b4fe4b6a482826ccc02c5ef79ca64eaad4a5d87ee5dfd4b747b86", 0x1000, 0x8}, {&(0x7f0000000300)="8fb359729c15e871b1f9d23f94b6819b280ace0f12d45952e3", 0x19, 0xd50b}, {&(0x7f0000001380)="c3cc57a9df508006696b0aa1a902934af821a3fcc104baafdd", 0x19, 0x7}, {&(0x7f00000013c0), 0x0, 0x4}, {&(0x7f0000002e40)="35f6f6871bcf3bc5d170b3df52632791937a2ce9bedb1691cc66ee08bad31e0fb0ad5f1e443c2926d3ba5e920e338546298b7ba1bd0873597e701348d6ea015f023ad75827e84d3a1da3489b7253baddd5978335f315251b107651dc0c790cad08827727bc2cb9fa120915fe808c8c7380a4dc6714bd55cfca6ea73b92e3a013580bfc936f55242fb00d7dc36b0c25c33309a22c9f6f4c2f8b3f89fad9aeeecd7e5385bdd1ecd3b60b325ec0827462c74bea07e85702555c8f8a06a7c0f525c8345b9cc3f64f63ecb5f845239ffa7e31f27e7c83c1007abba664de4e8724fb32d80dffc935a8f0b1843e6a394a6dbb3c9c39b6523f1ddbf4e25750fbee1b82d65b685aff184bb4acf1344af7313a2e3d696aff6165c542dbc5d1476458f60711527bf4424d083dae63aecf18d990656848acd2cf4adccd9fb9fefa431d3e670c66b799a021fe951914a25d0b0724b2d685fd882724eabe57029b3e16aaecf6b2f6e39fca39d5dbcebdcef197451a0f0194d7973ce89577eed8399368f471b2a17549cc2357e4ce1f33b9e9d0061a430e797d966945589c6443067231e05d58ddbb6e208825259054ea8b81fd0d289cb6ba9c048deeafc34bfe2447e65e218df7d402565027bfb500653a1865570fb8f28ab09c3a0d396a7b4f531ea7381525ff1447ff441ab5f6d759abbc6f70d7cde14456784fadec4c7233f00a6cff3ae785a086e700afc70c39f12ecccc81ebedc012be62748fcca52748061dbca82b0c6ed120ec9a896f9452ed9a2b9a48c68da7e991c90da6833e56712f0678f829116bd2b4b774784c701798dba2f60522f916eaad0a7f5a31b43c9e997cf46c6618e7cd7b84a3f660b08fc7b67b9179d17e8a2c22cd5da55067a835abd7ab6b642ac0aef3f5dc7911bc4ba837cba29b7ab7dc2df0ea8a2bca3e4c904602bfba087a464851d6be529393b9078ca1e5859b3b2e753ea3149d4b41a0ca3b688e7719d6a43832c4c1b9a7a9d5541322c873ea950d9cb0696b0e7d8e806e0c75aa48f82310fe86430c8f31681b88cc168ab35dd85808b7739eb366e58116e3a5961d5ea44c34ca144a3b80a257a592b18de16101326fa86e3e0305239bc4f8d58cc2a6b3211baf8259c3f2b85b208e2abdb6275dffed4ea3ad9b042b3bb6cbe8b2bf44f965b4e95afeb69635c395db6951e6b366ada58806f6925440536fe8d6901287f8547e44ac23cb0edea571e990ad2e9ba38252ccdde969393b75610f1bd48781e3d10520651a66e3fecb5705c4b03cd0cc726c81c340b946b1754aa37be8e002861e94c7900c88c0e453efed5109e46ddfff43d178faa810ea955546a24cd17b4d31111409ddea791aff6fbcd3ada9861b6a7cd06fac563196810fe77b1739258c0a5769d4c04fdc9dc23958dd7cc58c079d8d95ef89652c96ac21fafef7e70b3a94c7293f98c444bbcf0d98e0b3bfb9145fe8395703f9fecca07ced790fae6e59d634c5f996feb90588d5dc5d2d9c7a993ed1b8e98f922e6d08ae3e3562d3db267146ec92be6392db85e6733b588a8c253ebc2d3808ea020969b49f48688bcd3806348d89b5bd9e8d31813bb5587cff470b12e1b93bef703626ac8fa539d93b0975a23f676759fd8b290f8da9649b1529cc63cf2e0b9ea43a70fa5e7ebcd94d3c9f2623f63b8c295e4950ec9a800bd91870cc9e46ea3d3cfd83ec6be2be6ffc55ad7ac7746f5b58a0b24cd1d71c1d50067953de71ae2d522250ab46683e11d346c95e72ace8be137d3fb9da8a1791f102b9fa42f3008b8e292d093b1898853fd24fee6353411cf8e69e38c3df83922239b0d36a3edce406e4850b752657cc955e4d92acfa11aba3d420b49eb5ecfa447bf6879d3007138d3974954b87a525c08b98c415c579c1fb49f5d4c5c8e8bfac342f28b98b46254814f2688c0958b62fd95a08d17773898d5aaffc652c29ca8dffa8afa3cc8cbae03a512957c777ff2f2163ba953a7d2ea8cb56b4d64d5c60363af7c346ed036b853842f5f74068a8947bdeb5bdcee4a2d368cf4c64af646f3ffbe2272c1a888fcc7dcd32277dac08032e97b578c112f91ce26e6c7d191159137fa77958b1dea996ce02c167a55f9d00210c9ab8f9d7922c1d79556ff6a40fde46b34b21b2652f6f88c8e234c36a1a171096818b4e7cc170e1181a5b45fc05643e1621675efc52068e3ce4db0fb1ffe0534bc4dc482855fe055441df22cfdee7ffda1d015951434125e30830b5ef12864ed25f5b5e80e4b04f72cc72c74d312c5d182eb49e2aa558a86bf0d2bcaff4fa40fb5968524f8ae018218a493fc912cb8fc19360d57172552dd79c7575db982464336da839ca45c0690f2e868564f1986ef21ba424ccab9bb07995ea38203887a880e355045095470b1fb53050caf5ced2380ceec6b9e7ac3d1d6f94cd3b31a846306fb0e2d7261dfeff09e87ff9ab500e41796eb4b18330428efe12b7f24c638822e7e1bf0bdb34c0dd8f6acb4075c7cd84dbc8c4977ccc9c18d8d32cd0f24b7d6cd7415d3e8f8eb9d9b47cb4cf443388dc35c8768cb9bef3ce84fd19b4f85a12b9de96d7b954f2b9da0dbcf72d010559a62a368a757b774eb09aa91e33a325b15e4dc9ea1764c181debd924747e114404914535cea0f0dde58aee40a4d8c047c4c7c81f6bb238cf6e12ed0564fd22eaa1466974436556f652496b1a10b5e7018216e8e7180144675e17552616f1f131aebd19eaf4d577f34ff5ab52cab247c313207e11de6c7f591853f5dd2f7cd6cb6d03a6e9b2a99a93973abbf8907facf28db0983624f46425b39829cbe97c93150f6d33b3d9db8606e2857d15f7e29ccb3c9d6b3ece2594e87f7644b6e1828875a4b68d4e42a901477b5d5cfd373d5f0a68342a9ad676be59be97c88379c10ee2da599f1c9ec0b0c5cec003228bcd272ca3e55f7da70a89b2d5f4c9d0e73c877028b128f74815023f57a42b31b952e2311f45f230e1da198f1a420914e2d11e9d8fd7fff2e1987ed89631281fd615ef2abc1d462cf1d5af126f8b3f3e010b1cb1a9eb4da7d48c1b2c8dbbc3d81552f25796ff0aec09a355bc3a703b8807ff35e4b3523c7dfb5c239297d112b4274f56ee67a47301f93fea7f2007222025ed882955fe7a60bc33e70608258fb0dc7f20e6810398cbe260ab1cbc4bdea889bd28991bc3bdff5d4a47319f7aff77756bc2d65be9e0d06835d22709caedc35511797bfcf6dfb80977e0ac81ce19c6ca79fd1083ea16d2579729c332ce5259ac942a828b27108629414a8020a7e4ac36944561e9c567cc8f00a0a0c65d47f2bd40ce1b444ad0aa85da0ea292b7203905bd75099e96dd19b4fb6100084e50df4915cfba7ecbd24bb8be93eb0c9774c6240788f56af3edc3ebea740c73ddfc7504194e7cfe0894bee88db4dbfabf6cda8d96ac485f8348c94d23b7b8cd597b36a835a89cca4a67b243b12840b5e5121ec24a4a5bc99ff0ddf44764317e7105972248936b7fbcda31a2ea1dcffa0e57d6f8f6255cf11e1dd612f4f35518f52ae4bdff59c22cfa77dc314956fd561755ef6e70cebabff4aad5f091a1a558f4a1066976ad719375d4e5a5d029221cb52db8759cd49cac7b08be1488d108f077ab494391456a242ad3d97be23ac0fdfec6f2c94986a833236d457a8d76fe285a73de28d9b954df2d8931981517832633633fe54a1c0aa8af799ed02ac27e28d77e11bb9e2319c02be51fc2c642dc6d553b881c981027fe9966a8c267185282d51afe8722fa634f0a008c94aca042dc770088423b45f2525d764bb962309ad0b49044070516c4f9788a80de5f530f5cf89b34999a66b7d2cc8b598c6d304282cf09f4ffd0d7da23c982d276631ffa72a680dbbd11634f78c5e9cc0751fc8d5b393c68d215b7df383ec5e2623e117100dccd3037a056f0c127e6718f86f5917d91af6ddea455820cfc729632243449767ba8c855c06515160677ce25804f49394ee55395fdb63a8b16dbc4e20b8ee92e703887b86477c66dbcf6c63a170ef70ccca750bff1e2a26bf112ba8fc1cf067917d1f939eba0053ebffde1777a3c215e13f6b8415ec608f188577316c0c7543c42ae488bb8aeb703e70e4cb6ec8985aacfbed82c371aab5f1f2f8ffa0cf7390a67715192dc94d438b6c69f9d354d76901479bdc900468a3d23080c15b814c34200fd95f17c1eb56bc6923f8c3f6f5b5dadc7d44a5944d583a508340810584cd9f7852e0c78d642ce119d6eccfa7f83d87f2b94e50b9e61581d74d249cc2df73cb803c9ff7e5e07627108130619e6eeda8c137575e03d113b38da2a32a7c7bb768fa061a828f01f120dda66dd9665a2ba8c12db00e92be4c1e0382ab8334049578115de49bb5aa748a8ecfeb9e55097de5964e687023694c0d599280f9114650e52ac05c18ebca29706d7135c316727fb1a2e4b6fe75d438b0395a3c1a09c58d67bcc7c5525eb62840a367bfbe7c9c7dbe79be1d9c112c2e1d7c07a2ef1ad777461b28821b2ef5ddebc54aa1d60fb1f837e359a2b4c2163f1b1f86ea4a4c863a9f3546f07d51aff39b6b1d826e8264daac012a9242495eed140e654f5df1bccb08935e46c6a81337eea5dcaab2062db11f4f61c50f6ec254cde9e220b6d3d4c0ad8f76dc03b0de0cede593e448a570ebbccfc1acf1643578fed01e662692933d765c0ad0fdca81fddb682668772fa4a7a807490428ff323e8a4d040d9fd90e8594b57cffc7428a4aabbbc4f7cb4c09b7293e9f7f3f19a82e61e8b4f2cdb666174ab89ac96ddf307cca75718af052281f6bdc08aaa2710c99f19ad0947807aed93a3d2740bc4fc7349f2d1bb2410f9d597bbcf627a0b5076795fdf28778ac0f848046f44465197707fd89e0a913de8ba441bc2728a14555b5ee176e46bec67742755677f85db515023ffa36fe8e0d61687a0bb95bdcdee1c779139c898fe3c629049089e51c2eb99c5ef8d9d417f54b68c7f61622b8715d0429e7a47c792596d42934688e8f5cb14dc136e3b6758e3dd508496c07e16c54b13c6da7ee6695da90fa962fd86edcbaf2e121c9e25c1c476e19f4a1b0654b22bb4e5fa9a86dfbfc4420fae711918c2b13576139d4b4971695774d04cdb8ad580c22f8e060baaac0d53865de9765208fd03fe21916913ba30ed88110f8cc3ff3e30a6c199c066c09901a71f68b3aa4622c769708aafad332569a67ee35d37b9ce63821d89fe745a4156bd9a192dc4b2a91f665e890dd812af41acfae6568cf6585608f0ad9ba592f70cf02183f136c6fc622604c315d304628e45a0c756d31edc63c99365008539ac82542d00cba9306216be0d35b062c6084a2c2ae25f7495cd719659bc8efef6c9184ef793150ad4e49ca73897a8c2a1eceb782d71d50a69ccd6c47212e03fcc8dd0b4e39ea58905fef1c59f01571cb6f869225287222cccacf00477126d319e75001783a6758798211602b095baf9bad1b9381c0f78053e1f9fd3a82f0a88858c425ee2a077d97ba45f2b5dc28062a957da4f911cffb9a988da15d4940a824781a6ae3520dc24e3dcf4c30d590cbab13b19864751f8a6ce2ed7a7ba5a7830958c60b1767b5785ec547a1fd18a3ecf1fdcd540a59e1ab857a8c7aaa57b647439974adb4981b45984c2ffbd21afa2be3789a4dd8adbbb01f056060f3f4c4390b0a80660c9ac9c534668df3584c775fa5ad16851b6a71c2c1fa9c1e5e684b0816b0e0ca9707143f6f505961f90faea67a94ae4eab171b77a5633d6038ba4841036d94242f7a35d366a8dcc7", 0x1000, 0x40}, {&(0x7f0000001400)="a916c93958d803b9e380f837f473171b0b45a0dc6928c7da1b891c1e81af46179af3d8b67eabf805a88281466fd650fc0f4f5332a1a22fe0f0f77fe55e600d91f50c73d248f6b399a443bee0bb8f13d4d27fabb68d79af6b3fa55cf093920e0c93b858e50a8b2ef5d8438cc8ef33ac7f7607abb67f394eb44f593f9a9ed0140fe41f63d06ae840825ed24eacc6353232a1be013a55b96e94c0e8f1ea5171f6bdad655b397b569c146e20663573930b4463e75f134b7cf8699def976b62a5e854416e44611b", 0xc5, 0x5a}, {&(0x7f0000000340)="a0f740cc386cfeeb35f53257aec9ddda5236e98078966f811267ef500a29ea002aadbe2566913f804f68181f7070e8659de062a7fd8a020ceaf24348656d2369fbbcc4aff38242c4a47e042086e2116500bc0815e1ba649b341ed0010999d745acc211e285382daf0ae72236e2479147f690de74a2f8a670f0936872e274685c9925b2bb280a19306c58bc6c9faaa7b4d101e85df663636ca5586e96ac07287b86f61024d773d598f36a1c749a35065e3cd532fe4b28da6f0ee8936ae63e64010264e59c5551ee211e3fd8e71a5b7f869403258a9f929206e95e99a1bb571f49446061a55b1709", 0xe7, 0x9}, {&(0x7f0000000440)="2de5409d6188834b0ee3ab2cf0481c2d0bfde08e9a760f000000000000f941f3e53ef05ac34a75f508c65b191aec29bdec27e3aa0221fa4631c93f48f056f7c2a933956cb4effa571543e74e15998fa9ac47883929efeeca02947e8d16c650f7cbac6465d992fe12c00339f7e870df1f86029094e2ad815bdd86be511e2d3b90c715202d34f1399ab4cbc0546c2f6ee1f94723b721e3d8", 0x97, 0x2}, {&(0x7f0000000500)="a71acb3cba87ec5088efba4931b6b114f84bd900121688dd09bb82978f4da671382c71e8fd6dc8c6c224dbb142a19c5d6821e2ac9b8978e2853999392ae1b6e17a1abd29becd8de1cb34ae53ea431c19e087b033d21f38249e6888d56752a35214fa97210df2b347b9d37960fe661ff1143a6016e763f21eabba086f98dc2eabf6b1b9", 0x83, 0x4e1}], 0xcde4abbaf38da554, &(0x7f00000007c0)=ANY=[@ANYBLOB="25402726b0272a252c2c2ceb5e2d2d2a3a212d5c7b252b2c24295b26242c666f776e65723e", @ANYRESDEC=0x0, @ANYBLOB="2d657569643dad0b254b8d093cbef82d001917869c", @ANYRESDEC, @ANYRESOCT=r1]) openat2(r2, &(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x80001, 0x4a, 0x1b}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000000)={0x0, 0x7, 0x6, 0x4}) 22:59:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 22:59:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10, 0x80800) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) [ 2117.714997] loop6: detected capacity change from 0 to 135266304 [ 2117.720974] tmpfs: Bad value for 'mpol' [ 2117.735071] 9pnet: Insufficient options for proto=fd [ 2117.741209] 9pnet: Insufficient options for proto=fd 22:59:16 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 2117.783451] loop4: detected capacity change from 0 to 135266304 22:59:16 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r2 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r3, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) [ 2117.834516] loop4: detected capacity change from 0 to 135266304 [ 2117.864318] loop3: detected capacity change from 0 to 135266304 [ 2117.892309] tmpfs: Bad value for 'mpol' 22:59:31 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0xe4, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19180, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x8d, 0x6, 0x3, 0x0, 0x80000000, 0x400, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x800}, 0x2c51, 0x9, 0x7df18b58, 0x4, 0x1f529c67, 0x6, 0x8, 0x0, 0xfffffffb, 0x0, 0x4}, 0x0, 0x1, r0, 0x3) chdir(0x0) chdir(&(0x7f0000000100)='./file0\x00') 22:59:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 22:59:31 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0xd0101, 0x8) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = getpid() r4 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xd3, 0x87, 0x9, 0x3d, 0x0, 0x4, 0x4, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x9}, 0x0, 0x0, 0xfffffff9, 0x8, 0xffffffff80000000, 0x7fffffff, 0x7ff, 0x0, 0x2, 0x0, 0x3}, r3, 0x2, r1, 0x3) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001700)={0x0, 0x0}, &(0x7f0000001740)=0xc) r8 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r9, 0x0) r10 = syz_mount_image$nfs4(&(0x7f00000018c0), &(0x7f0000001900)='./file0/file0\x00', 0x0, 0x3, &(0x7f0000001b80)=[{&(0x7f0000001940)="9fa11c5b3f2ec707f94c135caf030ef46f04621d914cc573fa07c1c7dd886a6b8eb6f9c9f4f03ff38cbdf168b31bf70deeb147acc29edebcaa5f51e5bf8b1266f0ffa4a0b8943100227d8ac258941def07f705bd7ce1f9c544664c09534e7ceb51ff54a2ea93b2539d8cfaa4d372173b5c20abac75e867de39c0919910a230f9e6a2e8de3cd35e7c4890e4f90ac18cd7acf8a37205cecd0b64b250d61a2efd4ab72a562af4f55f171f9cfe9b0b901773c4d3d730d01a51f09a4fceb2f3b6b4190dea9a5ecda32519005581bd0b72bfffaafa4517e849946511f2d0e20df0735d411cd5dff12c4416cf42d05ce71d8a901e5ddfe0dc1f8d", 0xf7, 0xbe5}, {&(0x7f0000001a40)="5c5a7a6b29ec242a224f5b8d", 0xc, 0x3}, {&(0x7f0000001a80)="c4c0fecba3f896ac0b089388eb4a33742ce7b77cff9475a9b98a5640d213e457c2adf75e0c133bf18bb432521b9b292d0b92625d316dc1d72b2912a167a69f317fdfceb7b343783411ef1bb0e080f9d8523116ecbd99f1b3f9fab3fcf617b64d9c090469d503f8fd9937cd579aaa4bc673cd8f4e1e786f1e677e60119392c391ac97365696e8d84df543c39342b3ee71335e5d22d0f73dfee4183786b0aabeabd03e9fb6e3c1631824cba8aedc58b803ec41c294f1d9b03db0a7938f76d77559ef3c6c18a0411f8e30aadd6aa8f1c35c904c9dda1bb9d027", 0xd8, 0x2}], 0x800002, &(0x7f0000001c80)={[{'/dev/vcsa\x00'}, {'/dev/vcsa\x00'}], [{@smackfshat={'smackfshat', 0x3d, '['}}, {@fowner_eq={'fowner', 0x3d, r9}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@obj_role}, {@uid_eq={'uid', 0x3d, r7}}, {@dont_hash}, {@appraise}, {@dont_hash}, {@fsmagic={'fsmagic', 0x3d, 0xa4b7}}, {@fowner_gt={'fowner>', r7}}]}) openat(r10, &(0x7f0000002e40)='./file0\x00', 0x220400, 0xd4) r11 = dup(r5) fspick(r11, &(0x7f0000001780)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001840)=ANY=[@ANYBLOB="0100689e876716055bf3000046b5a7dd56323db0b2754fa9970d94123f605a294419092febf61ac805fb10b3b922236764dbce108c12d5a77d966085199baf22746b99b6186fd5e42c9a5f9982b0e6", @ANYRES32=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='./file0\x00']) sendmsg$unix(r5, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000180)="c3620a584a9fa3b30e1a4cf8589f91daee2a057158c7e0cd693902413cd81c4451ca8883ab951a2e5cb09f0c4f6f8e79e42ecd161906905d38509a1b081dd51f7e5433ab38576f96957c999de067c46c27aec70f5548956fcc840b861fb3d9bcf5ebf71c867efc26378548cfb96c7ddb931fbf850faa491cbc127b7e8e3314d907af09254da1fc94e346f543226ccfb00968f4d3e3fabf012ac3a640170a748d6b6b667293fc1499f704c2877cd351f0ce98deaaad271d44f07b16fbc5af43445ee6eff52cf9064729344853c106d2a6b95a7982", 0xd4}, {&(0x7f0000000280)="6539a9404c6c09b81ec3556529554a103519c45f41694190ec9b18055c31b4df3dd5497632f6f8dff90340061fb9ab8d5c9da210d3272b97d4fa03389bd4c55d6a73d7ad3ec1a36de57ca6c653c8b2e8e3c863e9858814d8cdc8ad84e8c1", 0x5e}, {&(0x7f0000000300)="615ae660f2821eb51ce3d67d93394d5049a3086118b7dad6a8a1866aaf8022d830a3c6f29d281f5f9c0540fd0162", 0x2e}, {&(0x7f0000000380)="a2f27fa86d4f5af969f4bf335d6e16ec4aff776095cab034e278", 0x1a}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="13987fd33678530c6f3b4b050a42e25aa9e75e076e7bd76d5727a3a05cf046e88829c0cc32b6ec849619e0cdfd7e0e7737cea2f89e15d430d597ac1f8b983c351149b26d0ccb788e696b", 0x4a}, {&(0x7f0000001440)="1f2902b64700ab30ef7584248069c3691ec9e08b0798fa10a12a3013f2d2ba5f874f243b0c837a16193286f3d92009a6025ed2f866ecf6d9cd8af3de0f5ad591cc996b9a15a3fd139eceb7f4e923e12ed2724959078e6df0df3ba1388345653a4c8f21da3cfdf7a5d1e7510737d960f064dfe2265979874fa9af84ec3344c380ccccc5982b94921589c188f16dad1c9dd2144fad6b5b6cfb3aad2420a4f2f7a462111b8eee1b1dedc774fb6229f134802a7e8ea9dae68034f3b9b315cc8b641ad6c96588efb0daa8871a9f0e9c71192da8238d6393da47dca5c0e52e4417f1527ca22a", 0xe3}, {&(0x7f0000001540)}, {&(0x7f0000001580)="7f1dd67354a25034977364da850aeab2900e85b21c653f546ce8655c88b020cff0469b99fe6e492a0b63405fa5cca3de99722f66c006064d8fb53b501e1f4a3112aa89c9ed1e3c70af48bcf79233f7d1f365bcbc086d2279e661ba5938ede1a536ecca734457743fd631382ad9135685a4aee61a6432f93b07fea7b991ae846ebd056b87efe2f2f33102d109c53d5e94e65b04cf79e7ffcceba32a0144e4bae39f08caf57094b27d4b90f9e3ad86ebbb2a14342f6e05bf7c64a3aed0422774", 0xbf}], 0x9, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r12}}}], 0x40, 0x14}, 0x4040) getdents64(r2, &(0x7f0000001540)=""/12, 0xc) 22:59:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) 22:59:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) 22:59:31 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 22:59:31 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r2 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r3, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 22:59:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2010010, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) syncfs(r2) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 22:59:31 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) syz_io_uring_setup(0x1906, &(0x7f0000000100)={0x0, 0xee69, 0x20, 0x1, 0x4f, 0x0, r1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) chdir(0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="0f54271962cbaaebdeb8056dad5a8ac56200f5e16abce8e82e9af3eb32f7554d94562453adf7f0d0cd717871f5e9bf291acf276cb67de050fe1012e6d9b30d44fe68ad561309000000"]) 22:59:32 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2133.701630] loop3: detected capacity change from 0 to 135266304 22:59:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003280)=[{{&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000006c0)=[{&(0x7f00000001c0)=""/174, 0xae}, {&(0x7f0000000280)=""/164, 0xa4}, {&(0x7f0000000040)=""/27, 0x1b}, {&(0x7f0000000380)=""/251, 0xfb}, {&(0x7f0000000480)=""/17, 0x11}, {&(0x7f00000004c0)=""/171, 0xab}, {&(0x7f0000000580)=""/112, 0x70}, {&(0x7f0000000600)=""/133, 0x85}], 0x8, &(0x7f0000000740)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xa0}}, {{&(0x7f0000000800), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000880)=""/3, 0x3}, {&(0x7f00000008c0)=""/136, 0x88}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/165, 0xa5}], 0x4}}, {{&(0x7f0000001a80), 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001b00)=""/13, 0xd}, {&(0x7f0000001b40)=""/29, 0x1d}, {&(0x7f0000001b80)=""/184, 0xb8}], 0x3, &(0x7f0000001c80)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000001d00)=""/28, 0x1c}, {&(0x7f0000002e40)=""/199, 0xc7}, {&(0x7f0000002f40)=""/224, 0xe0}, {&(0x7f0000003040)=""/105, 0x69}, {&(0x7f0000001d40)=""/12, 0xc}], 0x5, &(0x7f0000003140)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}], 0x4, 0x4, &(0x7f0000003380)={0x77359400}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x4b, 0x80, 0x7, 0x7f, 0x0, 0x3, 0x1400, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x400, 0x5, 0x80000001, 0x6, 0x80, 0x7, 0x3, 0x0, 0x2f, 0x0, 0x7ff}, r1, 0x10, r0, 0x8) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) [ 2133.755825] tmpfs: Bad value for 'mpol' 22:59:32 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 22:59:32 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x900}, 0x0) 22:59:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 22:59:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 22:59:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) flock(r1, 0xb) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) [ 2134.100406] loop3: detected capacity change from 0 to 135266304 [ 2134.103961] tmpfs: Bad value for 'mpol' 22:59:48 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x2200, 0x40) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) 22:59:48 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 22:59:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2010010, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) syncfs(r2) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 22:59:48 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 22:59:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {0x0, 0x0, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 22:59:48 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 22:59:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) tee(r2, r3, 0x100000000, 0x6) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x3000, 0x0) 22:59:48 executing program 0: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xf4, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [{{@pci, {0x8}}}, {{@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xffffffbd}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x24000040}, 0x8000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r3, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index=0x6, 0x101, 0x0, 0x1f9b, 0x0, 0x1}, 0x9) 22:59:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000540)=@random={'trusted.', '?-\x00'}) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x80000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000140)=@IORING_OP_SEND={0x1a, 0x3, 0x0, r4, 0x0, &(0x7f0000000100)="cb6a1a3be8376829ff9deb", 0xb, 0x20000010, 0x1}, 0x100) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x2, &(0x7f0000000440)=[{&(0x7f0000000280)="a6c6bc69fa780996007014bc6b096b29b7eb705effd73728d44103928add3e46437178c63ac512aba7b8165cbdc54eb152915b6ce3beaa26a5b2d8a980d5bda59210933b06cda30aa5b997f969de2cdd9097106430c1861f3c03be83ab34cf30bbd75b5759f45da08e78ef53094bc583719e2180a39a53bcac7125ec457acd2d81260e6860fbe485ea38e9090bf9fcc453a21ee98dbabe2fb7cf7c64aa3d6cc1c7d50ee77e91e85b3e7e3a22", 0xac}, {&(0x7f0000000380)="76cd3076666eed226efc16e9d2f4cf8c13c76168371ea032bce1de87aa39e5aac2ba4b1d78d82924272b5d4807d9c3d1c40e58954bc831674b7ba862aa2a945c929d77c42d6c20dc905fdb3d493a3f5c0663147d26d93eb28345479f41fdaded088998572849f87efb44419ed83e78413c25686ac0a75658301178ea2640fece7c808298e34734d1811345a22420aee05f235368a89260f6d73511b0d37679d732a140e96b58bf7f95996432d71d98505b3cd7370f5d81", 0xb7, 0xaf}], 0x0, &(0x7f0000000480)={[{@usrjquota}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@seclabel}, {@obj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'(\'\\'}}, {@smackfsroot}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@seclabel}]}) r5 = syz_io_uring_setup(0x1bc9, &(0x7f0000000580)={0x0, 0xa3f5, 0x4, 0x1, 0x7a, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000006c0), &(0x7f0000000600)=0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r7, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000680)=@IORING_OP_SPLICE={0x1e, 0x2, 0x0, @fd=r7, 0x6f, {0x0, r5}, 0x2, 0xd, 0x0, {0x0, 0x0, r0}}, 0x82b) syz_io_uring_setup(0x6c75, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x402}, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x5, 0x11aa7d53, 0x0, 0x0, 0x12, 0x1, {0x0, r11}}, 0x6) syz_io_uring_submit(r2, r6, &(0x7f0000000640)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x6, 0x0, 0x0, 0x0, {0x4040}, 0x1, {0x0, r11}}, 0x1) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 22:59:48 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 2150.314631] loop3: detected capacity change from 0 to 135266304 [ 2150.336585] tmpfs: Bad value for 'mpol' 22:59:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) [ 2150.409161] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:59:48 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x9900}, 0x0) 22:59:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {0x0, 0x0, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2150.574673] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 22:59:48 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 22:59:48 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000080)='./file0/../file0\x00', 0x8000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xc, 0x4010, r2, 0x8000000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) syz_io_uring_submit(r3, 0x0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd=r4, 0x0, 0x0, 0x4796, 0xd, 0x0, {0x0, 0x0, r1}}, 0x80000001) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 22:59:48 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x20, 0xff, 0x8, 0x0, 0xedcb, 0x19, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x1000, 0x5e, 0x1, 0x2, 0xcb, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x2, r0, 0x1) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000400)=[{&(0x7f0000000140)="ecec844d559e5de806acd66475023323f23719ddf60b2b445d917f84db4f71c19768d7ed20c430e948c914cf47bc4e85165661d96ce5628e3b9e69534ce4197bc2d8b7579a5c946159fef4db664a111c4e15054c516a44aa36095f15fb8e06ad1bedaa674189bc996745d46eb3c61e12f0c5a2d18f259a539d27a926eab2fb0c", 0x80, 0x4}, {&(0x7f00000001c0)="93325b160b82d94a404b11ac01d1a445d0071fdfbefdf6b7b90f9a8a99ab664feef1d617c3010a1a58eb0f27e6dcfbda5def57118047d2544b4996ccd94f8fc52854dbfcab3962f13beb0be550eb62e98ab3866cd05cb98cb56949a5185dfa598a058a2c60c6dcdf", 0x68, 0x7eb}, {&(0x7f0000000240)="181615978e95d360b1e9dbd4e6d7d41a53fe5beb0f7c8a8a", 0x18, 0xfffffffffffffffc}, {&(0x7f0000000280)="027827b25180f84847c0cce1d4adaf7d68315debf9a58f06733c1ef055841b96a488965ff6b899d40b0534cc9575451c43f7a743bbd6b5f05aeb4919318b09b6dd40cbcf854de52b13aaa6810211bc3d7cc77c82b4323c99858cc5dd6abdd1a63e8c8f783c020b663b8ddcf8a5d93c9c9c07", 0x72, 0x100}, {&(0x7f0000000300)="099069d5c1291fa4a8335868a8579e91ac46633bddb164c27fe4ef3b3a9e53abcfd2fd24c8cc8da6e725830d046dd263eb45a8c07ae887ca6279d103ace8a43ac854684c586e682c25ab8f54d8d8b8c5a3191f009a69cf6b36fcc0a82aa8fa57c3e5c18c69a2c0f60247a727fdd7cf6c5537923a327c2b73298282b5e1ebb28aa64780f8e46c9235928b0cf0eb4e164c9aa6901f5f3017e52a46d0b3840747201f9c530b1b4e2d226bfe0e5ac36bf4aef773e7b118da31a19e2b1740a5eb9c08b485497a0d59481b3f2b3cc2a275a740e8761a91b68c42b5ce03", 0xda, 0x3}], 0x80018, &(0x7f0000000480)={[{'$+$@[[//'}], [{@obj_type={'obj_type', 0x3d, '^[:\xd4-@$'}}, {@obj_type={'obj_type', 0x3d, ',&('}}, {@fowner_lt={'fowner<', r1}}]}) r2 = pidfd_open(0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) 22:59:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)) [ 2150.661866] loop0: detected capacity change from 0 to 8388096 22:59:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) [ 2150.793910] loop3: detected capacity change from 0 to 135266304 22:59:49 executing program 0: ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f00000000c0)={0x3ff, 0xffff, 0xff7f}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) chdir(0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x40, 0x44, 0x0, 0x2, 0x0, 0x8000, 0x2, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfff, 0x3, @perf_config_ext={0x6, 0x9}, 0x3004, 0x4, 0x6, 0x3, 0x80000001, 0x7, 0x7f, 0x0, 0x65, 0x0, 0xfffffffffffffffa}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bind$packet(r0, &(0x7f0000000080)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2150.823469] tmpfs: Bad value for 'mpol' [ 2150.827237] 9pnet: Insufficient options for proto=fd 22:59:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffffffff) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x6d0) chdir(0x0) 22:59:49 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 23:00:06 executing program 4: fcntl$getflags(0xffffffffffffffff, 0x408) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:00:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {0x0, 0x0, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:00:06 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x30000}, 0x0) 23:00:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4cb455fc}, 0x0, 0xfffffffffffffffe, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070517a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f79fb77689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0b7e48d66203f38287876724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a27ffd74255ef37a"], 0x420800) pread64(r0, &(0x7f0000000000)=""/36, 0x24, 0xfff) 23:00:06 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:00:06 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, 0x0) openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:00:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgid(0xffffffffffffffff) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xff, 0x1, 0x1, 0x9c, 0x0, 0x2, 0x8312, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0xffffffff, 0x8}, 0x241, 0x4955, 0x4, 0x4, 0x6, 0x8, 0x0, 0x0, 0xffff, 0x0, 0xffffffff}, r2, 0xa, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="07fbcd19e74000", @ANYRESHEX=r1, @ANYBLOB=',\x00']) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) getpid() unlinkat(r4, &(0x7f0000000000)='./file1\x00', 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) r5 = openat(r3, &(0x7f0000001b00)='./file1\x00', 0x40000, 0x100) r6 = pidfd_open(0xffffffffffffffff, 0x0) sendfile(r5, r6, &(0x7f0000001b40)=0x3f, 0x0) 23:00:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 2168.341326] 9pnet: Insufficient options for proto=fd [ 2168.385269] 9pnet: Insufficient options for proto=fd 23:00:06 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 23:00:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x255f, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) [ 2168.414044] loop3: detected capacity change from 0 to 135266304 [ 2168.438724] tmpfs: Bad value for 'mpol' 23:00:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x20, 0xff, 0x1, 0xf9, 0x0, 0x1, 0x24004, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5ba, 0x3}, 0x0, 0x5, 0x4, 0x4, 0xfffffffeffffffff, 0x10, 0x7370, 0x0, 0x3, 0x0, 0x3000000000000}, r1, 0xe, r2, 0x8) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:00:06 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, 0x0) openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:00:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0/../file0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x8010, r2, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:00:06 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x80000}, 0x0) 23:00:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4086, 0xff6) 23:00:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r2, 0x325, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) preadv(r5, &(0x7f0000000200)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1, 0xffff57e9, 0x4) accept4$bt_l2cap(r5, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x80000) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000840)=@newpolicy={0x244, 0x13, 0x9fca6f3545a427c3, 0x70bd2b, 0x25dfdbfe, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x0, 0x4e20, 0x0, 0xa, 0xa0, 0x20, 0x33, 0x0, 0xee00}, {0x63e, 0xfff, 0x2, 0x3a, 0x3, 0xffffffffffffffcf, 0x4, 0x2701}, {0x5e5, 0x0, 0x9}, 0x2c, 0x6e6bb7, 0x2, 0x1, 0x2, 0x3}, [@sa={0xe4, 0x6, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@remote, 0x4e23, 0x0, 0x4e21, 0x8, 0xa, 0x1a0, 0xa0, 0x4, 0x0, 0xffffffffffffffff}, {@in=@private=0xa010100, 0x4d4, 0x3c}, @in6=@remote, {0xfffffffffffffff9, 0x3, 0x8, 0x93, 0x5, 0x8, 0x0, 0x176}, {0x7, 0x1, 0xff, 0x6}, {0x80000001, 0x0, 0x6}, 0x70bd2c, 0x3500, 0xa, 0x2, 0x4, 0x80}}, @algo_comp={0x55, 0x3, {{'lzs\x00'}, 0x68, "f1618aad403294416d4bb4fe02"}}, @migrate={0x50, 0x11, [{@in=@loopback, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@empty, @in=@remote, 0x33, 0x2, 0x0, 0x3507, 0x0, 0xa}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4004}, 0x2000) sendmsg$NL80211_CMD_SET_QOS_MAP(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x11000200}, 0xc, &(0x7f0000000680)={&(0x7f0000000780)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="040026bd700039d86758b0c465a576206a5526bc9caa3cb246eb0b9756333fc95a7e00000000", @ANYRES32=r6, @ANYBLOB="1a00c70006015b000006080402010903100117174644ba69289b00003200c7000006ff0420060305340707021f010107fb064002020100033f020603ab030701030020030002507d1592c391b28100002000c700000204067f0575040907b002020200043f068007c1f53b3fe711c8fb"], 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x800, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x5, 0x71}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x64000000}, 0x20008850) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000440)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x7c, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x8000, 0x63}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x40}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x15}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x74}]}, 0x7c}, 0x1, 0x0, 0x0, 0x41}, 0x20040081) 23:00:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400), 0x0, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2168.740701] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2168.777692] loop3: detected capacity change from 0 to 135266304 [ 2168.783361] tmpfs: Bad value for 'mpol' [ 2168.794852] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 23:00:25 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, 0x0) openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:00:25 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:00:25 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r2, 0x325, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) preadv(r5, &(0x7f0000000200)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1, 0xffff57e9, 0x4) accept4$bt_l2cap(r5, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x80000) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000840)=@newpolicy={0x244, 0x13, 0x9fca6f3545a427c3, 0x70bd2b, 0x25dfdbfe, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x0, 0x4e20, 0x0, 0xa, 0xa0, 0x20, 0x33, 0x0, 0xee00}, {0x63e, 0xfff, 0x2, 0x3a, 0x3, 0xffffffffffffffcf, 0x4, 0x2701}, {0x5e5, 0x0, 0x9}, 0x2c, 0x6e6bb7, 0x2, 0x1, 0x2, 0x3}, [@sa={0xe4, 0x6, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@remote, 0x4e23, 0x0, 0x4e21, 0x8, 0xa, 0x1a0, 0xa0, 0x4, 0x0, 0xffffffffffffffff}, {@in=@private=0xa010100, 0x4d4, 0x3c}, @in6=@remote, {0xfffffffffffffff9, 0x3, 0x8, 0x93, 0x5, 0x8, 0x0, 0x176}, {0x7, 0x1, 0xff, 0x6}, {0x80000001, 0x0, 0x6}, 0x70bd2c, 0x3500, 0xa, 0x2, 0x4, 0x80}}, @algo_comp={0x55, 0x3, {{'lzs\x00'}, 0x68, "f1618aad403294416d4bb4fe02"}}, @migrate={0x50, 0x11, [{@in=@loopback, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in6=@empty, @in=@remote, 0x33, 0x2, 0x0, 0x3507, 0x0, 0xa}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4004}, 0x2000) sendmsg$NL80211_CMD_SET_QOS_MAP(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x11000200}, 0xc, &(0x7f0000000680)={&(0x7f0000000780)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="040026bd700039d86758b0c465a576206a5526bc9caa3cb246eb0b9756333fc95a7e00000000", @ANYRES32=r6, @ANYBLOB="1a00c70006015b000006080402010903100117174644ba69289b00003200c7000006ff0420060305340707021f010107fb064002020100033f020603ab030701030020030002507d1592c391b28100002000c700000204067f0575040907b002020200043f068007c1f53b3fe711c8fb"], 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x800, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x5, 0x71}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x64000000}, 0x20008850) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000440)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x7c, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x8000, 0x63}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x28}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x3c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x40}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x15}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x74}]}, 0x7c}, 0x1, 0x0, 0x0, 0x41}, 0x20040081) 23:00:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400), 0x0, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:00:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000001d40)={{0x1, 0x1, 0x18, r0, {0x1f}}, './file0\x00'}) perf_event_open(&(0x7f0000003e40)={0x2, 0x80, 0x1f, 0xff, 0x20, 0x0, 0x0, 0x10000, 0x29, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000001d00)}, 0x10008, 0x8, 0x97, 0x5, 0x3ff, 0x3f4, 0x12c, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xe, r1, 0x2) r2 = fork() sendmsg$nl_generic(r0, &(0x7f00000041c0)={&(0x7f0000003ec0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000004180)={&(0x7f0000003f00)={0x260, 0x15, 0x410, 0x70bd27, 0x25dfdbfd, {0x1}, [@nested={0x245, 0x42, 0x0, 0x1, [@typed={0x4, 0x26}, @generic="b2ab65f1373089b876ffa1aef6a5a108c6ba45a5d6119f85414d9b40a4c44a468e505257c3386fb84dd05bf432c878bcd9a048c9a9cb697d0a081be20bdd02a90ae583d26907353ea27edb14a38f5f90cb792a0830c667e66645afef8e91e3f6659e699dae61ad43ef0504112d60d48fcba824282508d1da53d1f0dd125ab988c6cfbd41e77d241edad18d1e22b9d0e115cf9ffbcbd74d084557484280e22491b07ff49b9f1d", @generic="13f7f54a0dc6da937c0634679ca72779a2f89dbbb682215773d8e4d6f99e8e1247213c930e9c8ca1af95c8808d2a2fac5728135beaed3d1226b9fe93a67b7dc0e36b71220174bbc87f1ad2194004645405ff2a7c462b6f61a36b0d4c46c88c339b0c98be4c8d8354a7863b1e7c16e293f2afd5b651cd66ca9e07e62d103e818de61bc7c89d264ef462f40ca5bea023fe02dd0ca9586b2b6d9afcc9bd1c3f50eeee16decd19a132d48e5c76ceeba67bc968285d3f426b4e9df1eaafc3950168d637", @generic="dd5f64f61957e1fb1d2246d73213926438ea493d5a0908665d4a399816daa8c5341a9ef150c1d8501c8adcf9fa2515662e303959b3d3f730626e016d6f245698fabd6009c4a153e1ed87cec91315dd3c3daeb9cbece7c233da346a3a84e8e625f99f94f8de90a39244c9f10cf2aa30df79e66c8cb6aae0f9c50c74cfcf6cbc6aacf55aedf8e52f8ab5c2d04a73886364c9760e5d883762dbfbdf0e437a770512cd370e10c098a1cb4582045987c9d9cdb83c52ffe4e7c3792e843754bacda535dd47a7a49809", @typed={0x8, 0x21, 0x0, 0x0, @pid=r2}, @typed={0x8, 0x0, 0x0, 0x0, @fd=r1}]}, @typed={0x4, 0x30}]}, 0x260}, 0x1, 0x0, 0x0, 0x841}, 0x20048890) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r3, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000004200), &(0x7f0000004240)='system_u:object_r:mnt_t:s0\x00', 0x1b, 0x3) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f0000001e00)=""/4100, 0x1004) recvmmsg$unix(r0, &(0x7f0000001b00)=[{{&(0x7f0000000640), 0x6e, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/194, 0xc2}], 0x1, &(0x7f0000000800)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x128}}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000940)=""/16, 0x10}, {&(0x7f0000000980)=""/252, 0xfc}, {&(0x7f0000000a80)=""/222, 0xde}, {&(0x7f0000000b80)=""/133, 0x85}, {&(0x7f0000000c40)=""/244, 0xf4}, {&(0x7f0000000d40)=""/51, 0x33}, {&(0x7f0000000d80)=""/27, 0x1b}, {&(0x7f0000000dc0)=""/52, 0x34}, {&(0x7f0000000e00)=""/236, 0xec}], 0x9, &(0x7f0000000fc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xf8}}, {{&(0x7f00000010c0)=@abs, 0x6e, &(0x7f0000001380)=[{&(0x7f0000001140)=""/119, 0x77}, {&(0x7f00000011c0)=""/203, 0xcb}, {&(0x7f00000012c0)=""/101, 0x65}, {&(0x7f0000001340)=""/32, 0x20}], 0x4}}, {{&(0x7f00000013c0)=@abs, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001440)=""/192, 0xc0}, {&(0x7f0000001500)=""/162, 0xa2}], 0x2, &(0x7f0000001600)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001640)=@abs, 0x6e, &(0x7f0000001a80)=[{&(0x7f00000016c0)=""/79, 0x4f}, {&(0x7f0000002e40)=""/4096, 0x1000}, {&(0x7f0000001740)=""/43, 0x2b}, {&(0x7f0000001780)=""/161, 0xa1}, {&(0x7f0000001840)=""/2, 0x2}, {&(0x7f0000001880)=""/134, 0x86}, {&(0x7f0000001940)=""/26, 0x1a}, {&(0x7f0000001980)=""/235, 0xeb}], 0x8}}], 0x5, 0x12160, &(0x7f0000001c40)={0x77359400}) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="17860c37612e8f602b11c88afa5322f41c8bbe5f264cacc10dfbe949ce2862667a1a50d51f93f0308c00b6dd483ebf4b4f708100f2aa0ff70ac312d8f2e8c9118df7e77ad5c15186f88290fa3cb4348f5364196ffb90d4c4b13f3859ac0d3052b82d18801382c498efe0c0f2e4e9f6399f763184ab3f876a66aa71f651643d0af70531e39e80cd186e1cf74f32db2e1b8ca7a3ca1b6fe07b65af2111c5657327c4167cb156d6e004af3299c62ab30aa493b5cfdcf1a7c5bf7620a6560b777d22562b04d6b4eabc3126d245b3ed1059f10d14d4254b56e8d06a82e720af59c487b2eaba13a36b4f", 0xe7, 0x2}, {&(0x7f00000001c0)="d76cee32c8fed50e4e2e9820fc9b5b3282e6fde317d505b3663913db86239539f45c647ddc5c25e42fe9acc5a58787b7f906883b41f17b825e8b66a25f0b3ad88eba5acfe56700660477a9538e2d4e9ef797323d6c65955dd0c00ebf22fc2c2fec5ae28a57fc66475f61b503541173412cda1acafc4de5f65da858d246ca4d488a9f441119ea193ddbb8ad8c2c9d112c63cabb65d95b18fc35837ff94e5cc0c5113dd64cfe4bb49110c97335bb96c70aed52b92d3df40319c94fd4e1dcc803b86e87cb07b076e3ca113d957d190ac4e0dd6fa502166fe8a9801419584d34378c3af016bfd8684388b17b27", 0xeb}, {&(0x7f00000002c0)="a95ae19c47b904405168e130be5bfa44a50d41d8469cdf3fc9ac647ea147d8f73966101ce22a7e1d4330a1d5e951ae3fb7b3f3109cb7c8f6c59fb1cbc48d2416017a05fc9097ae32508e59bc28cd4303ca263e914ea6b84c0d008dae2bb6a66114a158236b78e2b0c37853c926440a5b754ed0de8b", 0x75, 0x7f}, {&(0x7f0000000380)="1603e0eec2b82bf6a78a727d8d4e6595354966d929229992b86aa3411c14f2afae05b995e7387d096e68b9636975dcd078b33b3c66cb0528f3404691d241448ad69e35bec6d40d0517084b0430f74afc9941b7d29d3984d8dd7b8e0d3a88d5340b27b4e488c4f9a863011e5670fef4bb197ce6d686c1af7014e6bf8a4f9e98749632f548a276e910a120981f55a347e19b3d1d4d25fd0b283469f0737aa7963182bf5a21be97ae27a18f72", 0xab, 0x8}, {&(0x7f0000000440)="ac084201c4a7eaf43ee987ac4d6673046bbb89a8fa58e9eec80a529fdc1e7f312bd69f5052796818b437af0815ec54f6ed853ae1fd9da022b061f7829a03229493dca02d31b9a77ad0c014affca82b083e8d24d692f1cade16e754778b81087b80bd4ae79d5ae05350170415", 0x6c, 0x76}, {&(0x7f00000004c0)="f71e1f0d034d56ed816a08d49ffce79e818017bc4790b713d368aaf0a7a1fc28d6e902ff688dfe7130e5b8298cba2d1b6c66cc0b9f16a43877d7b40bb31f8330e280364dd5d887d060d34f38cdcea101d460108d4bf3812a5785d5e2c0319fbde5f393df0ee71064aab16d7ef4945707fad9155653b51dad3534546b5b412916d578094acc3b7d5f05b84ec60b98a262c065360d8b6e366f0f1b906ec3782bab44bc034d8b", 0xa5, 0x6}], 0x0, &(0x7f0000001c80)={[{'$*%'}, {'({{#$-:\\[@('}, {'{#*-\xe2'}], [{@context={'context', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x12}}, {@uid_gt={'uid>', r5}}, {@subj_type}, {@subj_user={'subj_user', 0x3d, '+@\x0e\\)\'%%-)'}}]}) 23:00:25 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 23:00:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) readv(r0, &(0x7f0000001340)=[{&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000080)=""/159, 0x9f}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/227, 0xe3}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/33, 0x21}, {&(0x7f00000012c0)=""/65, 0x41}], 0x7) 23:00:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r2], 0x38}}], 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r3, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r5], 0x38}}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r6, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000265d9815c5bb6dcd16a6f54ffde0c8ae56f2bd03629b6aecdd59e7745aab4a305b8d9fa73619df2a8f6226ea8629ef106ea18ebc6ca61cee87a62f15859b4e3288325945b3c41a128380ae0f793d865f6b5817356e3e26050467857a21d1ec2d8be9faebed1fd0263ef1c1de6f182d81bc9b55790febdaa256af5f973b38e3acbe1181f90d40010018b9", @ANYRES32=r8], 0x38}}], 0x1, 0x0) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r9, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @rand_addr=0x64010100}, 0x10, &(0x7f0000001600), 0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r11], 0x38}}], 0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x32c, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x1d0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x400}}, {0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x6, 0x7, 0x7}, {0x6, 0x2, 0x1}, {0x2, 0x2, 0x0, 0x4}, {0x8, 0x8, 0x7f, 0x3ff}, {0x73e, 0xfb, 0xff, 0x7}, {0x1, 0x7, 0x3, 0x80000001}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r11}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x100}, 0x20040894) [ 2187.136675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 23:00:25 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 2187.145930] loop3: detected capacity change from 0 to 135266304 [ 2187.157988] nfs: Unknown parameter '$*%' [ 2187.169645] tmpfs: Bad value for 'mpol' 23:00:25 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(0xffffffffffffffff, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:00:25 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) fallocate(r1, 0x63bdabcf66e74c0a, 0x68, 0xec34) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x4900, 0x40) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x10) pread64(r2, 0x0, 0x0, 0x0) r3 = dup3(r2, r0, 0x80000) setsockopt$inet6_int(r3, 0x29, 0x3c, &(0x7f0000000040)=0xda3e, 0x4) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000100)=""/107, 0x6b}, {&(0x7f0000000180)}, {&(0x7f00000001c0)=""/115, 0x73}, {&(0x7f0000000240)=""/140, 0x8c}, {&(0x7f0000000300)=""/227, 0xe3}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/219, 0xdb}, {&(0x7f0000000580)=""/38, 0x26}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/154, 0x9a}], 0xa) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x20) socket$nl_xfrm(0x10, 0x3, 0x6) [ 2187.302871] nfs: Unknown parameter '$*%' 23:00:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400), 0x0, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:00:25 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 23:00:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x40000400007, 0x0, 0x0, 0x40002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80800) sendfile(r3, r4, &(0x7f0000000100)=0xbe3, 0x1) 23:00:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x24000, &(0x7f0000000380)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@aname={'aname', 0x3d, '@'}}], [{@uid_gt={'uid>', 0xee00}}, {@pcr={'pcr', 0x3d, 0x3a}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}]}}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x3f, 0x47, 0x3, 0x0, 0x3a5, 0x20aa4, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffa, 0x1, @perf_bp, 0xc00, 0x0, 0x5, 0x6, 0x401, 0x6, 0x4, 0x0, 0x2, 0x0, 0x45d}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xa) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040), 0x5, 0x4200) renameat2(r1, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x2) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0x42}}, './file0\x00'}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) fchmodat(r3, &(0x7f0000000240)='./file0\x00', 0x1d5) mknodat(r2, &(0x7f0000000200)='./file0\x00', 0x800, 0xb81) 23:00:25 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) fallocate(r1, 0x63bdabcf66e74c0a, 0x68, 0xec34) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x4900, 0x40) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x10) pread64(r2, 0x0, 0x0, 0x0) r3 = dup3(r2, r0, 0x80000) setsockopt$inet6_int(r3, 0x29, 0x3c, &(0x7f0000000040)=0xda3e, 0x4) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000100)=""/107, 0x6b}, {&(0x7f0000000180)}, {&(0x7f00000001c0)=""/115, 0x73}, {&(0x7f0000000240)=""/140, 0x8c}, {&(0x7f0000000300)=""/227, 0xe3}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/219, 0xdb}, {&(0x7f0000000580)=""/38, 0x26}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/154, 0x9a}], 0xa) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x20) socket$nl_xfrm(0x10, 0x3, 0x6) 23:00:25 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 2187.556480] loop3: detected capacity change from 0 to 135266304 [ 2187.572717] tmpfs: Bad value for 'mpol' 23:00:25 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) fallocate(r1, 0x63bdabcf66e74c0a, 0x68, 0xec34) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x4900, 0x40) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x10) pread64(r2, 0x0, 0x0, 0x0) r3 = dup3(r2, r0, 0x80000) setsockopt$inet6_int(r3, 0x29, 0x3c, &(0x7f0000000040)=0xda3e, 0x4) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000100)=""/107, 0x6b}, {&(0x7f0000000180)}, {&(0x7f00000001c0)=""/115, 0x73}, {&(0x7f0000000240)=""/140, 0x8c}, {&(0x7f0000000300)=""/227, 0xe3}, {&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/219, 0xdb}, {&(0x7f0000000580)=""/38, 0x26}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/154, 0x9a}], 0xa) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x20) socket$nl_xfrm(0x10, 0x3, 0x6) 23:00:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x1, 0x20, 0x4, 0x3, 0x0, 0x9, 0x80000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xd426, 0x4, @perf_config_ext={0x10001, 0x7}, 0x10, 0x8, 0x7ff, 0x5, 0x5, 0x2, 0x5, 0x0, 0x6, 0x0, 0x4}, r2, 0xd, r0, 0xa) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) 23:00:26 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(0xffffffffffffffff, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:00:26 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_u}, {@mmap}, {@posixacl}, {@cache_loose}]}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:00:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0d", 0x3b, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2187.819607] loop3: detected capacity change from 0 to 135266304 [ 2187.830592] tmpfs: Bad value for 'mpol' 23:00:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0x5, 0x9, 0x87, 0x0, 0x41e47ddd, 0x2004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x8010, 0x1f, 0x8, 0x6, 0x8fb, 0x1, 0x5c3, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x9) mmap$perf(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x8, 0x10, r0, 0x3) 23:00:42 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0, 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:00:42 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 23:00:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:00:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 23:00:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0d", 0x3b, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:00:42 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(0xffffffffffffffff, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:00:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x11, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',euid<', @ANYRESDEC, @ANYBLOB=',defcontext=staff_u,smackfshat=wfdno,\x00']) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:00:42 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@debug={'debug', 0x3d, 0x80000001}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r0) openat(r3, &(0x7f00000003c0)='./file0/../file0\x00', 0x2082, 0x48) write(r2, &(0x7f0000000300)="6445b7991605680b5aa0224d682f0c70986fd07b969ad6cce949300e61dd4b5afec58b328ef92e", 0x27) ioctl$MON_IOCX_MFETCH(r5, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x4}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000002c0)={0x0, 0x1, 0x6, 0x10000, 0x9}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) mkdirat(r3, &(0x7f0000000140)='./file0/../file0\x00', 0x14) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:00:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) [ 2204.207519] loop3: detected capacity change from 0 to 135266304 [ 2204.211512] tmpfs: Bad value for 'mpol' 23:00:59 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, 0x0, 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:00:59 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0)}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:00:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="20ae9a7289881e3125427e6699b17db3cb0f64c8335023aa77fbf81d20823515e796bedeefb7b885a963491ba5ada308203480097b299719a372a71a02ed845c03aa21244cd5dd913dff997539a02b9be830f9", 0x53, 0x101}, {&(0x7f0000000140)="838168bb60c6bdb305df3d41495d69fe3c91efd094603fa88bf31642c40932bd", 0x20, 0x8}], 0x2000000, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0xfffffffffffffff9}}, {@huge_never}, {@nr_blocks}], [{@obj_role={'obj_role', 0x3d, '!'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:00:59 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x58, 0x2, 0x1, 0x301, 0x0, 0x0, {0x5, 0x0, 0x3}, [@CTA_NAT_DST={0x4}, @CTA_PROTOINFO={0x40, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x3c, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x1}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x1000}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x1f}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x6}, @CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0x2}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc, 0x3, 0x1, 0x0, 0x9}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20004800}, 0x840) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000440)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) io_cancel(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5, r3, &(0x7f0000000240)="9117bb5af52c", 0x6, 0x4, 0x0, 0x2, r4}, &(0x7f00000002c0)) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="f43dd79430ccf8d238fb3b992439361d3a1931f59ad97ebc6f82d71d893e06a1ccdc000000000000002538ae1e840b69897a3c12073b776aef", @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',\x00']) writev(r6, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:00:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0xfdef}], 0x1) [ 2221.394740] loop4: detected capacity change from 0 to 512 [ 2221.400706] tmpfs: Bad value for 'mode' 23:00:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0d", 0x3b, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:00:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7fff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) sendfile(r0, r1, 0x0, 0x1) chdir(0x0) 23:00:59 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 23:00:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair(0x9722d710c837b841, 0x2, 0x6c7c, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, &(0x7f0000001640), &(0x7f00000016c0)=0x6e) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) [ 2221.517783] loop3: detected capacity change from 0 to 135266304 [ 2221.544573] tmpfs: Bad value for 'mpol' 23:00:59 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 23:01:18 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3f, 0x0, 0x5, 0x8, 0x0, 0x10001, 0x2000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x400, 0x2, 0x4598, 0x8, 0x7fff, 0x27d, 0x8001, 0x0, 0x7, 0x0, 0x100000000}, 0x0, 0xe, r1, 0x1) dup(0xffffffffffffffff) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) openat(r0, &(0x7f0000000040)='./file0\x00', 0x800, 0x95) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x1) getdents64(r3, &(0x7f0000001e00)=""/4100, 0x1004) 23:01:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x80, 0x9, 0x4, 0xf7, 0x0, 0x1, 0x42, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7f, 0x4, @perf_config_ext={0x2, 0x200}, 0x4000, 0x2, 0x8001, 0x3, 0x9, 0x7fffffff, 0x100, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x7, r0, 0x1) chdir(0x0) 23:01:18 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0)}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:01:18 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 23:01:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:01:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b8869", 0x58, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:01:18 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, 0x0, 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:01:18 executing program 6: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d44"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:01:18 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x99000000}, 0x0) [ 2240.489519] loop3: detected capacity change from 0 to 135266304 [ 2240.506862] tmpfs: Bad value for 'mpol' 23:01:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:01:19 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 23:01:19 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, 0x0, 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:01:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b8869", 0x58, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:01:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/../file0\x00', 0x600100, 0x178) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0x20000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) openat(r1, &(0x7f0000000000)='./file0\x00', 0x690201, 0x104) 23:01:19 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 23:01:19 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf64(r2, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0xd7, 0x80, 0x2, 0x8, 0x7, 0x3, 0x3, 0x12, 0x326, 0x40, 0x1b5, 0x2, 0x7f8e, 0x38, 0x2, 0x4f, 0xb50b, 0x1}, [{0x70000000, 0x100, 0x7, 0xfffffffffffffff7, 0x7, 0x1ff, 0x8, 0x7ff}, {0x7, 0x101, 0x9, 0x8, 0x1, 0x10001, 0x400, 0x2}], "ffca64c71c8300b09c640c92025060aff4d93e897c6a185f69911d243d23468e1056edb4fc37005d71f4457215a3dd02f8cb25bb43bd7004e936e61ea7364eb9402af79f5d85aecc432f2dc51c755c80599211ef6639c4dc4f2875e3f7d764a6984288c84a62c04e23cb38ee549211c831c531d67c3d3c826399c58d88e4150ff3b0dbc54aee49bfcb6a2497", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa3c) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000), &(0x7f0000000040)={'L-', 0x7}, 0x16, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000004c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, r6}}, './file1\x00'}) mount$9p_fd(0x0, &(0x7f0000000ac0)='./file0/../file0\x00', &(0x7f0000000b00), 0x2040000, &(0x7f0000000b40)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r6}}], [{@fsmagic={'fsmagic', 0x3d, 0xf6}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@appraise}, {@obj_role={'obj_role', 0x3d, '}'}}, {@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'trans=fd,'}}]}}) 23:01:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:01:19 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000200)='./file0\x00', 0x8000, 0x542cb10d21946923) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = creat(&(0x7f0000000140)='./file0\x00', 0xe3e283afd564716c) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000180)=0xe7d4) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) fcntl$getown(r4, 0x9) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000080)="1f7c3be5", 0x4}, {&(0x7f00000003c0)="a9f1f1abb3c52b8ee399b7817e96b35bfd80949f9cde65b1a1d49668d00dd76c50014b3686ce2483c3ea83e27b32cf91f310d8510401cbd77e1b7080f4195ff0ca570a40b65b1639fa07f7a395b78d29118446d2c330b5a58c15266ac8492311b3351223df1550c7f49301043bb8c2fe44d3191af70f2d4ce4facf486feca8a1454ce3e1f14e64a55c0027c4286440cabaa64356228fe3f593985a342a22a52f52a115c38617abf44564110f47d8dfffca974ea111f02626", 0xb8}, {&(0x7f0000000540)="c7437490aaadf893ca2fb964ead33a1417ab857567a7a9553e5e66f9ea282bc4fd53d1b3de08a84074cc457899c28f2196daf0fa433dff3580f0f4cfeba2bf25dbafd1af02f27e7701dbc24519abd55722de427064d419a12e1c022b869f9d440469faa4bfac82fb096c9e41cefad70b19d96365f160d050520ff87dd5ea0fcf06f7eaa5c18b003a871fd0b538ae5ed7ad426e8b84b4e85e0a82d7a2692067f992dfc8edc3d81243ba24d9640dd4d0bddfb98f333ccd5d9d2d7fa9afca80ef3a83", 0xc1}], 0x3) [ 2240.941475] loop3: detected capacity change from 0 to 135266304 [ 2240.947838] tmpfs: Bad value for 'mpol' 23:01:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b8869", 0x58, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:01:38 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:01:38 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) 23:01:38 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0)}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:01:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:01:38 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='\x00', &(0x7f0000000040), 0x2204024, &(0x7f00000000c0)={[{@name={'name', 0x3d, '$\\'}}, {@none}, {@xattr}, {}, {@noprefix}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@noprefix}], [{@audit}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@measure}, {@appraise_type}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x27}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000380)) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x80000, 0x81) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) openat(r2, &(0x7f0000000180)='./file0\x00', 0x20400, 0xc) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000001e00)=""/4100, 0x1004) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r4, 0x0) fallocate(r4, 0x40, 0xb5d6, 0x4) 23:01:38 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r0, 0x80000) chdir(0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) openat(r1, &(0x7f0000000000)='./file0\x00', 0x777c00, 0x0) 23:01:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000005c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0/../file0\x00'}) mkdir(&(0x7f0000000240)='./file0/../file0\x00', 0x1b) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="7472616e72b538137cb7b81e7c0994a334b7af016661a0515f3d66642c7266641500f847ffffffffff75f6fa3d3e50b9abb9f9d5a2f59d32074e7b57cbf15139ee4005c2190a07fe7fc602506d03f6eeb50aefbae9175c839e51a241", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="7e995b3dc73ee9aef0543077af333222c5f400"]) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) openat(r3, &(0x7f0000000200)='./file0/../file0/file0\x00', 0x200000, 0x1a0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x4}) setxattr$security_evm(&(0x7f00000002c0)='./file0/../file0/file1\x00', &(0x7f0000000300), &(0x7f0000000580)=@v1={0x2, "ee614128"}, 0x5, 0x1) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) writev(r5, &(0x7f0000000100)=[{&(0x7f00000003c0)="e1c5614a28f1817b1f2d1599be78d8c0dad310a2c95525fa3e1e01bbebd3a286b6702fbb0a095861da08401bde476efed7a32a4e7f611be4884f1aba55c830343c0c51894b8e87b1a243509e2750c48607c8f09dec81eb8925f63e6158b31c1e21c0e78cf64c874c25c46b1e36c36e545fc79f2a05a2cef220375eec79b746b7bfc97cb5981f6aea7de9ccc01707dc15357d6cac7ca3f05e3c67ce733698dbf7a16852278a344271c7ef9b6d1e13b08cba3e70e5", 0xb4}, {&(0x7f0000000000)="ab746ddd835f34596d9e652f8b0bea74304d71e430d24fa41e6c465f2115b095eac5ed358dc8082f76cb242c390c7120f7", 0x31}, {&(0x7f0000000080)="634e8ebf3d763cd7f29475887d827df0a5c634f5e161bc38d0", 0x19}, {&(0x7f0000000480)="0f2447e28cd600c701fcf1e3e8650d265e6be20a50b90d28be063d7bb31a283c242f6acc167fca923a968737e514aea4093b59d24c05d81480af7256508bcbf4dc09dd611fef079dd3faf39f4c6733d1261adef1ba5a62a1adeeabd77e181b52ebea3f8c77b22d65031a854caff993c830e1f125fed44e3d781877851b364b0e26db40e77620856eadef7c778a83565c3c7663291d2b34e24e6be5b2cfb7b79b923d0f66777ca15fc2bb52adacb63fc1c91642eb0bb801018a4917c867f4d4cbe838b8ca048c1572764b439acfba1298f2f3b7778395c395bb7c56a6d491bf4f738b155059542405f5ec8d3a8b78fb944fd90f4b8a04ab583e46d222", 0xfc}], 0x4) 23:01:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) r2 = accept4$unix(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x1000) getpeername$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) open_by_handle_at(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x42a541) [ 2260.725758] loop3: detected capacity change from 0 to 135266304 [ 2260.731074] tmpfs: Bad value for 'mpol' 23:01:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 23:01:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x62, 0x3, 0x0, 0x6, 0x0, 0x401, 0x4610, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x4000, 0xfffffffffffffffd, 0x553d, 0x7, 0x7, 0x5, 0xfffd, 0x0, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x18) chdir(0x0) 23:01:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {0x0, 0x0, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2261.002001] loop6: detected capacity change from 0 to 135266304 [ 2261.013757] tmpfs: Bad value for 'mpol' 23:01:56 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 23:01:56 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:01:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) pipe(&(0x7f0000000140)) sendfile(r0, r2, &(0x7f00000000c0)=0x1, 0x59f) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xd4, 0x0, 0x50, 0x80, 0x0, 0x6ced, 0x2008, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x2480, 0x3, 0x7e, 0x6, 0x7fff, 0x6, 0xfff, 0x0, 0x1bb2, 0x0, 0x61d0}, 0x0, 0x9, r1, 0xb) chdir(0x0) 23:01:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 1) 23:01:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4f", 0x67, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:01:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = signalfd4(r1, &(0x7f0000000140)={[0x6]}, 0x8, 0x80000) faccessat2(r2, &(0x7f0000000940)='./file1\x00', 0x100, 0x200) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) recvmsg(r4, &(0x7f0000000840)={&(0x7f0000000200)=@sco, 0x80, &(0x7f0000000780)=[{&(0x7f00000003c0)=""/193, 0xc1}, {&(0x7f00000004c0)=""/212, 0xd4}, {&(0x7f00000005c0)=""/177, 0xb1}, {&(0x7f0000000680)=""/232, 0xe8}, {&(0x7f00000002c0)=""/110, 0x6e}], 0x5, &(0x7f0000000800)=""/45, 0x2d}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x102803d, &(0x7f0000000880)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c7762646e6f3d9d6d60d320250ea466105713bb0dad1aa46f293eced0dd218410c68b381e4e3c438004ba916cf35eb130d76054953aa2c625a266b31401724e6d75e471e05ead7d066f8cb2634b", @ANYRESHEX=r0, @ANYBLOB=',cache=mmap,subj_user=[,obj_role=,\x00']) 23:01:56 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:01:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0xfffffffffffffd02, 0x0, 0x40081, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0), 0x80000, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x97, 0x0, 0x0, 0x80, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount(&(0x7f0000000040)=@sg0, &(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x2000, &(0x7f0000000200)='(,/[:}\xfa\x00') mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c7766646eb058d0b0ac6f3d", @ANYRESHEX=r2, @ANYBLOB=',\x00']) openat(r2, &(0x7f0000000000)='./file0\x00', 0x80000, 0x50) [ 2278.727469] FAULT_INJECTION: forcing a failure. [ 2278.727469] name failslab, interval 1, probability 0, space 0, times 0 [ 2278.729897] CPU: 1 PID: 11327 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2278.731398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2278.733127] Call Trace: [ 2278.733683] dump_stack+0x107/0x167 [ 2278.734443] should_fail.cold+0x5/0xa [ 2278.735238] should_failslab+0x5/0x20 [ 2278.736032] __kmalloc_track_caller+0x79/0x370 [ 2278.736991] ? strndup_user+0x74/0xe0 [ 2278.737791] ? __schedule+0x82c/0x1ea0 [ 2278.738603] memdup_user+0x22/0xd0 [ 2278.739351] strndup_user+0x74/0xe0 [ 2278.740180] __x64_sys_mount+0x133/0x300 [ 2278.741043] ? copy_mnt_ns+0xa00/0xa00 [ 2278.741871] do_syscall_64+0x33/0x40 [ 2278.742646] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2278.743711] RIP: 0033:0x7ff784b43b19 [ 2278.744495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2278.748403] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2278.750317] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2278.752092] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2278.753790] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2278.755478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2278.757146] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2278.780471] loop3: detected capacity change from 0 to 135266304 [ 2278.783416] tmpfs: Bad value for 'mpol' 23:01:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wzdno=', @ANYRESHEX=r3, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x9, 0x4, 0x3, 0x7, 0x0, 0x4, 0x1410, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x5, 0xffffffffffff5be1}, 0x8, 0xb4, 0x6, 0x5, 0x8, 0x7fffffff, 0x4, 0x0, 0x9feb, 0x0, 0x9}, r1, 0x3, r2, 0x3) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:01:57 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 2278.866204] 9pnet: Insufficient options for proto=fd 23:01:57 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:01:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 2) [ 2278.894694] 9pnet: Insufficient options for proto=fd 23:01:57 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:01:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4f", 0x67, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:01:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) shmat(0x0, &(0x7f0000002000/0x3000)=nil, 0x2000) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000380)) [ 2279.040350] FAULT_INJECTION: forcing a failure. [ 2279.040350] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.042626] CPU: 0 PID: 11351 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2279.044005] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2279.045679] Call Trace: [ 2279.046206] dump_stack+0x107/0x167 [ 2279.046935] should_fail.cold+0x5/0xa [ 2279.047707] ? create_object.isra.0+0x3a/0xa20 [ 2279.048626] should_failslab+0x5/0x20 [ 2279.049383] kmem_cache_alloc+0x5b/0x310 [ 2279.050196] create_object.isra.0+0x3a/0xa20 [ 2279.051071] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2279.052101] __kmalloc_track_caller+0x177/0x370 [ 2279.053104] ? strndup_user+0x74/0xe0 [ 2279.053868] memdup_user+0x22/0xd0 [ 2279.054571] strndup_user+0x74/0xe0 [ 2279.055290] __x64_sys_mount+0x133/0x300 [ 2279.056091] ? copy_mnt_ns+0xa00/0xa00 [ 2279.056883] do_syscall_64+0x33/0x40 [ 2279.057621] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2279.058615] RIP: 0033:0x7ff784b43b19 [ 2279.059353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2279.062984] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2279.064509] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2279.065925] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2279.067351] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2279.068772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2279.070184] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:01:57 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 2279.094763] loop3: detected capacity change from 0 to 135266304 [ 2279.108576] tmpfs: Bad value for 'mpol' 23:01:57 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xe1, 0x6, 0x1f, 0x3, 0x0, 0x3, 0x81400, 0x6, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x67af30f31a3f379f, @perf_config_ext={0x0, 0x2}, 0x48, 0x20, 0x9, 0x3, 0x6, 0x13, 0x1ff, 0x0, 0x0, 0x0, 0x10001}, r1, 0xd, r0, 0x0) chdir(0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20880, 0x80) 23:02:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 3) 23:02:14 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:02:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4f", 0x67, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:02:14 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:02:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) 23:02:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:02:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}, {@fscache}]}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) r2 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0xfffffffffffffffe, 0x5, &(0x7f00000002c0)=[{&(0x7f00000003c0)="50955728cbde8984daeed0931595240b4917a1426bcfc59d3ea8e953ca0b6a1837a51a1d2c584df778b7b08fd8b508e133433afb1b5e89fa27e8f378af67d37b8e47ca53ad002cc6d8dd780be5d4640c5f89b8aa665d55ede33ccd31fa41b57079382b3df3907eb1534690d9f807409a2c8e64e48b9b304be626d565b391cdea9157dbda2175a3f48f487855e03888024ac0f4844335fcb40e764631fb09c64d9a611287e60b0b12e61c06e67844d96223a4c3dc6eee454b862a16d439e8c55ed85307e973f51d8e2125b6f9925a305baef7a7b2bc1b0fcb1e3f6c359b52700aca803f8959ff32e03f187973d5c8c7be73c244f46c6fa5", 0xf7, 0x4}, {&(0x7f0000000100)="2f90d13f3eb344264669ae67e03c30fece62f5c5ba40b5a54f30273bdb8c1d06a9ce59559d4b3e32ae9c310d510818f95c40171ee2243997a9c715a630a1869b36f58be4922fab", 0x47, 0xe5}, {&(0x7f0000000280)="ff1e36a1607d0a54cecb16c040", 0xd, 0x7fffffff}, {&(0x7f00000004c0)="87861989ca36b20520feab0fcc73e08a3ed5ca9f58e9cc3d6f21119c9c6570e5f69b9a42ca45ec1a8556dbbfc05382cbaff5a755fa073118f64f76f1a177ef3b56ee06691408eb5e7af202c597c8f3c991f10abdae848966b99969e8078ab51bef2afbf2662b99401308b9a37f5c64cd75ab136ccb65a5bbb324c724b960287e1311b0496de4", 0x86, 0xfffffffffffffffd}, {&(0x7f0000000580)="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", 0x1000, 0x4}], 0x2b, &(0x7f0000001640)=ANY=[@ANYBLOB='rfdno,+&,smackfsfloor=trans=fd,,smackfstransmute=.,euid>', @ANYRESDEC, @ANYBLOB="2c6149707072616973652c66756e633d4d4d41505f434845434b2c4652448189d6b31c99aa44fbf2a3e3226991cf52f8"]) ioctl$int_in(r2, 0x5421, &(0x7f0000001600)=0x3) 23:02:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=@ax25={{0x3, @default}, [@bcast, @null, @bcast, @bcast, @netrom, @rose, @rose, @rose]}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/215, 0xd7}, {&(0x7f0000000280)=""/144, 0x90}], 0x3, &(0x7f0000000480)=""/102, 0x66}, 0x0, 0x10001, 0x1, {0x2, r1}}, 0x1) [ 2296.458683] FAULT_INJECTION: forcing a failure. [ 2296.458683] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2296.461364] CPU: 0 PID: 11379 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2296.462823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2296.464572] Call Trace: [ 2296.465153] dump_stack+0x107/0x167 [ 2296.465926] should_fail.cold+0x5/0xa [ 2296.466742] _copy_from_user+0x2e/0x1b0 [ 2296.467583] memdup_user+0x65/0xd0 [ 2296.468341] strndup_user+0x74/0xe0 [ 2296.469122] __x64_sys_mount+0x133/0x300 [ 2296.469984] ? copy_mnt_ns+0xa00/0xa00 [ 2296.470837] do_syscall_64+0x33/0x40 [ 2296.471625] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.472711] RIP: 0033:0x7ff784b43b19 [ 2296.473506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.477391] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2296.478996] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2296.480495] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2296.482006] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2296.483505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2296.485003] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:02:14 executing program 0: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x20010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_NOP={0x0, 0x2}, 0x4) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000008, 0x8010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x468ac}, 0xfffffff9) chdir(0x0) [ 2296.619606] loop3: detected capacity change from 0 to 135266304 [ 2296.642446] tmpfs: Bad value for 'mpol' 23:02:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pwrite64(r0, &(0x7f0000000000)="099cdc51f6d5acfc68bd4ec16e565327a84f3e3940873aab15db4d1f3169ca2d2a6e57190f09679efc1d90918c7a7c8bd6bab095506e62b83702cff8af51bcb5211948c3c758a97207cd02aa41839e9824ec3fa6de286ece623edff6", 0x5c, 0x9) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_RM_DEV(r2, 0x5000940b, &(0x7f0000000380)={{r3}, "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"}) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) 23:02:15 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 23:02:15 executing program 0: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000400)={0x156, 0x9}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:02:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:02:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 4) 23:02:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca0", 0x6e, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:02:15 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) [ 2296.873363] FAULT_INJECTION: forcing a failure. [ 2296.873363] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.875879] CPU: 1 PID: 11409 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2296.877345] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2296.879073] Call Trace: [ 2296.879631] dump_stack+0x107/0x167 [ 2296.880401] should_fail.cold+0x5/0xa [ 2296.881225] ? copy_mount_options+0x55/0x180 [ 2296.882162] should_failslab+0x5/0x20 [ 2296.882968] kmem_cache_alloc_trace+0x55/0x320 [ 2296.883915] ? _copy_from_user+0xfb/0x1b0 [ 2296.884795] copy_mount_options+0x55/0x180 [ 2296.885688] __x64_sys_mount+0x1a8/0x300 [ 2296.886531] ? copy_mnt_ns+0xa00/0xa00 [ 2296.887527] do_syscall_64+0x33/0x40 [ 2296.888309] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2296.889435] RIP: 0033:0x7ff784b43b19 [ 2296.890238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2296.894195] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2296.895797] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2296.897321] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2296.898810] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2296.900328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2296.901849] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:02:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) clock_gettime(0x0, &(0x7f0000004280)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004140)=[{{&(0x7f0000000040)=@qipcrtr, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/159, 0x9f}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f0000000200)=""/208, 0xd0}, {0x0}, {&(0x7f0000000300)=""/108, 0x6c}, {&(0x7f0000000380)=""/136, 0x88}, {&(0x7f0000000440)=""/29, 0x1d}], 0x8, &(0x7f0000000500)=""/4096, 0x1000}, 0x58b2}, {{&(0x7f0000001500)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001580)=""/36, 0x24}, {&(0x7f00000015c0)=""/76, 0x4c}, {&(0x7f0000001640)=""/176, 0xb0}, {&(0x7f0000001700)=""/184, 0xb8}], 0x4, &(0x7f0000001800)=""/130, 0x82}}, {{&(0x7f00000018c0)=@generic, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001940)=""/158, 0x9e}, {&(0x7f0000001a00)=""/192, 0xc0}, {&(0x7f0000001ac0)=""/13, 0xd}], 0x3, &(0x7f0000001b40)=""/78, 0x4e}, 0xcf}, {{&(0x7f0000001bc0)=@sco={0x1f, @none}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001c40)=""/106, 0x6a}, {&(0x7f0000001cc0)=""/145, 0x91}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x3, &(0x7f0000002e40)=""/4096, 0x1000}}, {{&(0x7f0000003e40)=@generic, 0x80, &(0x7f0000004100)=[{&(0x7f0000003ec0)=""/52, 0x34}, {&(0x7f0000003f00)=""/168, 0xa8}, {&(0x7f0000003fc0)=""/222, 0xde}, {&(0x7f00000040c0)}], 0x4}, 0x9}], 0x5, 0x0, &(0x7f00000042c0)={r1, r2+60000000}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa0200, 0x4) [ 2297.085433] loop3: detected capacity change from 0 to 135266304 [ 2297.094337] tmpfs: Bad value for 'mpol' 23:02:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 5) 23:02:30 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:02:30 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x2) 23:02:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x0) open_by_handle_at(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070517a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f79fb77689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0b7e48d66203f38287876724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a27ffd74255ef37a"], 0x420800) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x6, 0x2, 0x79f7, 0x7cf, 0x8}) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000780)={0x7f, 0x5, 0x80000000, 0x0, 0x53c}) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = syz_mount_image$nfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x5, 0x5, &(0x7f0000000500)=[{&(0x7f0000000180)="1e0d9108f8ea93f8e8c66571dfabb83a09bad2aef230df62f6e343a3c81f932a1eb653e6d0415addff3241", 0x2b, 0x3}, {&(0x7f00000001c0)="d23adce7c7be7776a6dac9e76052fee24a7d986827b7afa2e36d4dc11e4f28e8096246beccfa164e6294907b13e9a2db5b94632935244066a529d4cb10a8ed74f022be07cf6c4aea63d9441be3d4e900b1294d066389978de535687713f4012f642cdf18ac5c68daeb35269d04735bd433c50181235e0e570b801fdd090fc0c394ad13554b1ffe8caa26a62853118de8d7733bab4ee7c50993b33d38756b5a84a6dcc66af662a3c48bcb3483c60f98cb981baa23df5ee336bc7db75a1cb24f76898f5c19de5705c991f8ed927dbcf96a6b43d2584e970ff3c782ac75d1756222b0b7b24989cd0cd495f9c5f8ef1277de493ede87", 0xf4, 0x1}, {&(0x7f0000000380)="16fda7ead3a095d8c75001fdad4b7c1aed638ddabea9391a5cae61129e50975fa78780edde8d5bb80adeacdb244e1904b8d2b0f5e9aa68aa15d664cbc87ff3ff895f63e1e38430bd13dd50e0beee27e37cf96692b9ed661d511e9308b20543847058faeb782268b918a55f9cc8d60571f5d1e512bca79776ce6c042afc7f6c4ea07cff5db85794a6729bb7641947b130617addd0f8cbd21a51e5280ff9d9dcd5fb99dcba3a4a764a5bba3330f2398bb0", 0xb0, 0x101}, {&(0x7f00000002c0)="31ab6898f36621a9f566dd2f1cf2a8bb3fad7dba5c8c378796b8bbbf4711145f4e30b2aafceccca3b69b769e1e7d6c99be494dde375b451c3ea41c0a1f07e05c1a5680fd17949e", 0x47}, {&(0x7f0000000440)="4f65cb8ad3544cbdab73da74741294d540c90b1d469448736faf6c08c719846425b5d13483c4bbb2acf2d3a68e7ee686454c03c77241952ec4bdf2db6bc7979d998978cc470e6c481292b37d1934c9547217f0dc8322ac5f546bed8a5b65f4c94de40f960aaf8dce2be5c257dc35f5bbd1e1d054017f3623c79045face1c1eee5542c882528d910fe7618a1eda", 0x8d, 0x5}], 0x1010040, &(0x7f0000000580)={[{'%@'}, {'\\/],{\\.#@)%$@(-,-]'}, {'\x00'}, {'#'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x34, 0x38, 0x31, 0x61, 0x38, 0x39], 0x2d, [0x65, 0x66, 0x38, 0x65], 0x2d, [0x31, 0x63, 0x63, 0x63], 0x2d, [0x31, 0x38, 0x35, 0x38], 0x2d, [0x62, 0x36, 0x31, 0x65, 0x0, 0x38, 0x66, 0x34]}}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@euid_eq}]}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@debug}, {@access_any}, {@mmap}], [{@dont_measure}]}}) getdents64(r4, &(0x7f0000001e00)=""/4100, 0x1004) 23:02:30 executing program 0: modify_ldt$write2(0x11, &(0x7f0000000040)={0x1, 0xffffffffffffffff, 0x4000, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1}, 0x10) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) chdir(0x0) 23:02:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca0", 0x6e, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:02:30 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x10f2027, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="788fa81884fb2b022d43f4510f8c188e548b1aa2547cab23ffb99af9ab13d07302161b7fff7f3637d3d68eccdbe10698b021fcc1369a3b11fde98e44a26d1c71f458917f34ece7e2d3376367ccfeb0f57f06e30ac7"]) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0xffffffffffffff7a}], 0x1) 23:02:30 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2312.381464] FAULT_INJECTION: forcing a failure. [ 2312.381464] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.383892] CPU: 0 PID: 11439 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2312.385346] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.387084] Call Trace: [ 2312.387643] dump_stack+0x107/0x167 [ 2312.388418] should_fail.cold+0x5/0xa [ 2312.389217] ? create_object.isra.0+0x3a/0xa20 [ 2312.390201] should_failslab+0x5/0x20 [ 2312.391004] kmem_cache_alloc+0x5b/0x310 [ 2312.391856] create_object.isra.0+0x3a/0xa20 [ 2312.392778] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2312.393854] kmem_cache_alloc_trace+0x151/0x320 [ 2312.394841] copy_mount_options+0x55/0x180 [ 2312.395724] __x64_sys_mount+0x1a8/0x300 [ 2312.396573] ? copy_mnt_ns+0xa00/0xa00 [ 2312.397396] do_syscall_64+0x33/0x40 [ 2312.398184] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2312.399253] RIP: 0033:0x7ff784b43b19 [ 2312.400029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.403889] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2312.405475] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2312.406983] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2312.408475] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2312.409976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2312.411464] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2312.422334] loop4: detected capacity change from 0 to 512 [ 2312.426551] nfs: Unknown parameter '%@' [ 2312.434486] 9pnet: Insufficient options for proto=fd 23:02:30 executing program 2: mknod(&(0x7f0000000000)='./file0/../file0/file0\x00', 0x400, 0xfffffff8) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:02:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) [ 2312.532915] loop3: detected capacity change from 0 to 135266304 [ 2312.537291] tmpfs: Bad value for 'mpol' 23:02:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0xc1, 0x2, 0x9, 0x5, 0x0, 0x6a0b, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x4, @perf_config_ext={0x8, 0x5}, 0x220, 0xdb, 0x2, 0x8, 0xffff, 0xfff, 0x800, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) 23:02:30 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x3) 23:02:31 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:02:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca0", 0x6e, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:02:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001140)=""/61, 0x3d}], 0x4, &(0x7f00000011c0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x90}}], 0x1, 0x40000041, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x9e, 0x2, 0x40, 0x37, 0x0, 0x9, 0x2, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x3f, 0x5}, 0x4130, 0xffff, 0x35, 0x1, 0x8000, 0x42b5, 0x9, 0x0, 0x6557, 0x0, 0x80000001}, r0, 0xc, r1, 0x1) chdir(0x0) 23:02:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 6) 23:02:31 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x80100) openat(r1, &(0x7f0000000040)='./file0\x00', 0x220000, 0xf3) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) 23:02:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8) [ 2312.896123] FAULT_INJECTION: forcing a failure. [ 2312.896123] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2312.898760] CPU: 1 PID: 11475 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2312.900220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.901978] Call Trace: [ 2312.902544] dump_stack+0x107/0x167 [ 2312.903308] should_fail.cold+0x5/0xa [ 2312.904113] _copy_from_user+0x2e/0x1b0 [ 2312.904952] copy_mount_options+0x76/0x180 [ 2312.905849] __x64_sys_mount+0x1a8/0x300 [ 2312.906698] ? copy_mnt_ns+0xa00/0xa00 [ 2312.907596] do_syscall_64+0x33/0x40 [ 2312.908382] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2312.909484] RIP: 0033:0x7ff784b43b19 [ 2312.910278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.914155] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2312.915747] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2312.917237] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2312.918745] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2312.920238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2312.921750] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:02:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6, 0x1f, 0x40, 0x0, 0x0, 0x6, 0x20008, 0xd, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x50010, 0x1800000000, 0x9, 0x6, 0x6c, 0x733, 0x7, 0x0, 0xdbd7, 0x0, 0x80}, r0, 0x3, 0xffffffffffffffff, 0x0) chdir(0x0) [ 2313.000830] loop3: detected capacity change from 0 to 135266304 23:02:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x9) [ 2313.004728] tmpfs: Bad value for 'mpol' 23:02:31 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x8) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) faccessat2(r2, &(0x7f0000000140)='./file0\x00', 0x8b, 0x100) openat(r3, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0xcc, 0x9, 0x0, 0x1ff}) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) 23:02:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x20006, &(0x7f0000000100)=ANY=[]) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:02:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:02:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac", 0x72, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:02:49 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x0, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:02:49 executing program 0: r0 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r6, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r7, 0x0) syz_io_uring_setup(0x6c75, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x402}, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd, 0x11aa7d53, 0x0, 0x0, 0x12, 0x1, {0x0, r11}}, 0x6) syz_io_uring_submit(r3, 0x0, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0x3, 0x0, r7, &(0x7f0000000300), &(0x7f0000000040)='./file0\x00', 0x2, 0x4000, 0x1, {0x0, r11}}, 0x2) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, r5}}, 0x6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:02:49 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf) 23:02:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) sendto$inet6(r3, &(0x7f0000000100)="3f7b304747b3c1eeb42356eceffc991a5d0fad1e46b40c0db3fe38c8b05e65055e5f5a7e1c9d0ce670e48a2aa3b8898efbca87db97d55a7abc4b700882fe789ef4c4364977f81c13e6d03a41307773c8a386", 0x52, 0x4008001, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @remote, 0x400}, 0x1c) 23:02:49 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:02:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 7) [ 2331.165602] FAULT_INJECTION: forcing a failure. [ 2331.165602] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.168023] CPU: 1 PID: 11521 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2331.169469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2331.171196] Call Trace: [ 2331.171752] dump_stack+0x107/0x167 [ 2331.172509] should_fail.cold+0x5/0xa [ 2331.173301] ? getname_flags.part.0+0x50/0x4f0 [ 2331.174250] should_failslab+0x5/0x20 [ 2331.175150] kmem_cache_alloc+0x5b/0x310 [ 2331.175995] getname_flags.part.0+0x50/0x4f0 [ 2331.176920] ? _copy_from_user+0xfb/0x1b0 [ 2331.177784] user_path_at_empty+0xa1/0x100 [ 2331.178684] __x64_sys_mount+0x1e9/0x300 [ 2331.179527] ? copy_mnt_ns+0xa00/0xa00 [ 2331.180357] do_syscall_64+0x33/0x40 [ 2331.181135] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2331.182208] RIP: 0033:0x7ff784b43b19 [ 2331.182990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2331.186849] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2331.188440] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2331.189933] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2331.191432] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2331.192921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2331.194422] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:02:49 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0xc01, 0x1) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) 23:02:49 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x60) [ 2331.277776] loop3: detected capacity change from 0 to 135266304 [ 2331.280402] tmpfs: Bad value for 'mpol' 23:02:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 8) 23:02:49 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="78bf4f82a8e821f403a3", @ANYRESHEX=r2, @ANYBLOB=',\x00']) r3 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000040), 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x89, 0x6, 0x1, 0x7, 0x0, 0x2, 0x80000, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x50c, 0x4, 0x2, 0x0, 0x8, 0x2, 0x4, 0x0, 0x101, 0x0, 0xd4a}, r3, 0x0, r4, 0xa) close_range(r0, r1, 0x0) chdir(0x0) 23:02:49 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xff, 0x3f}}, './file0\x00'}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x8, 0xfe, 0x3, 0x6, 0x0, 0x3ff8000, 0x30810, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x10, 0x81, 0x3, 0x6, 0x2, 0x0, 0xfffa, 0x0, 0x9, 0x0, 0x8be}, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0x1) 23:02:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac", 0x72, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2331.437645] FAULT_INJECTION: forcing a failure. [ 2331.437645] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.440167] CPU: 1 PID: 11545 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2331.441598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2331.443324] Call Trace: [ 2331.443877] dump_stack+0x107/0x167 [ 2331.444630] should_fail.cold+0x5/0xa [ 2331.445421] ? create_object.isra.0+0x3a/0xa20 [ 2331.446377] should_failslab+0x5/0x20 [ 2331.447172] kmem_cache_alloc+0x5b/0x310 [ 2331.448088] create_object.isra.0+0x3a/0xa20 [ 2331.449003] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2331.450055] kmem_cache_alloc+0x159/0x310 [ 2331.450935] getname_flags.part.0+0x50/0x4f0 [ 2331.451842] ? _copy_from_user+0xfb/0x1b0 [ 2331.452696] user_path_at_empty+0xa1/0x100 [ 2331.453574] __x64_sys_mount+0x1e9/0x300 [ 2331.454419] ? copy_mnt_ns+0xa00/0xa00 [ 2331.455240] do_syscall_64+0x33/0x40 [ 2331.456013] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2331.457069] RIP: 0033:0x7ff784b43b19 [ 2331.457821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2331.461638] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2331.463218] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2331.464695] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2331.466182] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2331.467655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2331.469132] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2331.551534] loop3: detected capacity change from 0 to 135266304 [ 2331.564721] tmpfs: Bad value for 'mpol' [ 2349.009611] FAULT_INJECTION: forcing a failure. [ 2349.009611] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2349.012376] CPU: 0 PID: 11565 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2349.013864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2349.015716] Call Trace: [ 2349.016305] dump_stack+0x107/0x167 [ 2349.017108] should_fail.cold+0x5/0xa [ 2349.017968] strncpy_from_user+0x34/0x470 [ 2349.018887] getname_flags.part.0+0x95/0x4f0 [ 2349.019868] ? _copy_from_user+0xfb/0x1b0 [ 2349.020795] user_path_at_empty+0xa1/0x100 [ 2349.021731] __x64_sys_mount+0x1e9/0x300 [ 2349.022630] ? copy_mnt_ns+0xa00/0xa00 [ 2349.023522] do_syscall_64+0x33/0x40 [ 2349.024345] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2349.025477] RIP: 0033:0x7ff784b43b19 [ 2349.026270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2349.028966] 9pnet: Insufficient options for proto=fd [ 2349.030362] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2349.030383] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2349.030392] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2349.030469] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2349.037917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2349.039466] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2349.042555] 9pnet: Insufficient options for proto=fd 23:03:07 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x0, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:03:07 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:03:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 9) 23:03:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x400, 0x80) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:03:07 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x99) 23:03:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22d2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:03:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRES64, @ANYRESDEC]) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:03:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac", 0x72, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:03:07 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf0) 23:03:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x42045, 0x10000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x7f, 0x1, 0x7f, 0x4, 0x0, 0x4, 0x1, 0xf, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3, @perf_config_ext={0x4, 0x1}, 0x40010, 0x8, 0x9, 0x9, 0x401, 0x6, 0xff, 0x0, 0x4, 0x0, 0x7fffffff}, r0, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8b, 0x3a, 0x81, 0xce, 0x0, 0x7fffffff, 0x65010, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x15600, 0x8000, 0x81f, 0x2, 0x20, 0x5, 0xb3, 0x0, 0x40, 0x0, 0x7}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) chdir(0x0) 23:03:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 10) 23:03:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',\x00']) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:03:07 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/57, 0x39) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x490000, 0x100) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) [ 2349.202718] loop3: detected capacity change from 0 to 135266304 [ 2349.215854] tmpfs: Bad value for 'mpol' [ 2349.260995] 9pnet: Insufficient options for proto=fd [ 2349.261492] FAULT_INJECTION: forcing a failure. [ 2349.261492] name failslab, interval 1, probability 0, space 0, times 0 [ 2349.264866] CPU: 1 PID: 11586 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2349.266622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2349.269039] Call Trace: [ 2349.269772] dump_stack+0x107/0x167 [ 2349.270680] should_fail.cold+0x5/0xa [ 2349.271650] ? alloc_fs_context+0x57/0x840 [ 2349.272838] should_failslab+0x5/0x20 [ 2349.273806] kmem_cache_alloc_trace+0x55/0x320 [ 2349.274957] alloc_fs_context+0x57/0x840 [ 2349.276012] path_mount+0xaa3/0x2120 [ 2349.276943] ? strncpy_from_user+0x9e/0x470 [ 2349.278040] ? finish_automount+0xa90/0xa90 [ 2349.279123] ? getname_flags.part.0+0x1dd/0x4f0 [ 2349.280302] ? _copy_from_user+0xfb/0x1b0 [ 2349.281331] __x64_sys_mount+0x282/0x300 [ 2349.282358] ? copy_mnt_ns+0xa00/0xa00 [ 2349.283338] do_syscall_64+0x33/0x40 [ 2349.284283] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2349.285558] RIP: 0033:0x7ff784b43b19 [ 2349.286502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2349.291078] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2349.293017] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2349.294835] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2349.296657] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2349.298473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2349.300292] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2349.306448] 9pnet: Insufficient options for proto=fd 23:03:27 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x0, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:03:27 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x300) 23:03:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 11) 23:03:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={[{}, {@cpuset_v2_mode}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@cpuset_v2_mode}, {@cpuset_v2_mode}, {@xattr}, {@none}, {@release_agent={'release_agent', 0x3d, './file1'}}, {@clone_children}], [{@euid_lt={'euid<', r0}}, {@subj_role={'subj_role', 0x3d, '+'}}, {@obj_type={'obj_type', 0x3d, ')%/\\,!$('}}]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREADDIR(r1, &(0x7f0000000380)={0xe0, 0x29, 0x1, {0x401, [{{0x80, 0x4, 0x1}, 0x3f, 0x20, 0x7, './file1'}, {{0x4, 0x2, 0x4}, 0x5, 0x0, 0x10, './file0/../file0'}, {{0x80, 0x0, 0x1}, 0x71b0, 0x2, 0x10, './file0/../file0'}, {{0xcf62465212392672, 0x1, 0x7}, 0x0, 0x20, 0x7, './file0'}, {{0x4, 0x4, 0x2}, 0x80000001, 0x8, 0x10, './file0/../file0'}, {{0x80, 0x1, 0x3}, 0x1, 0x81, 0x7, './file0'}]}}, 0xe0) chroot(&(0x7f0000000140)='./file1\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0), 0xa, &(0x7f0000000480)=ANY=[@ANYBLOB="7472616e7321633790f1097d762420a7aa84b13d66642c7266646e6f3d2a012df8e3d567127e90e5e831673f04e24872e5b7af55eed8740864d3caee53db1cc6a60cc2965a0079889c4bd039ebb7be308864c128dc70be321f87db658e0160", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6f626a5f747970653d5d2f2c736d61636b6673726f6f743d282a5c26252d2a2c686173682c646f6e745f6d6561737572652c6f626a5f726f6c653d3970002c61707072616973652c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e65645f752c7375626a5f726f6c653de8308638ea538cc35feb943f6aa729865db0354ff06af1f8c11277ec6f950b3b94117021a89ddaba1f3985f480747a71e4165c2c00"]) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:03:27 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:03:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bd", 0x74, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:03:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x59) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:03:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x711e, &(0x7f0000000000)={0x0, 0xb422, 0x0, 0x0, 0x2d7}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000400)) syz_io_uring_setup(0x6c75, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x402}, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x100) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd, 0x11aa7d53, 0x0, 0x0, 0x12, 0x1, {0x0, r6}}, 0x6) syz_io_uring_submit(r0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x1, 0x2007, @fd=r1, 0x5, &(0x7f0000000100)="a277890c4c9d657430fcda60e74ea2dae9ad35d7f9133db6adc64e90b7d2e52d0958f596a697504e2897a59f202ad53562b6f511304bafb0de9bce1b24ef9f2e5c95b069e7b927d7676537697efe6fd090d5a8e7faa704cc9c2cbda84e539785e304a98e424fd87fe4a74b30ead17a3f3ffdaef962ea492ab6b5b604ea431baca1ecde554ab6ed0b20fbc508da7b9f57dc4bf34630298cc165b813e13c74e85a96b806647d153802510c1307487f1185f2bfa2c9b124b233724d791b3b3161b6cf90b4cfe1e0290d78f675d2b81da2df7cd2cd6c748087b41e8535db82115572f8dcfe8c8c925d9e171ce8", 0xeb, 0x5, 0x0, {0x0, r6}}, 0x3) chdir(0x0) [ 2368.899368] FAULT_INJECTION: forcing a failure. [ 2368.899368] name failslab, interval 1, probability 0, space 0, times 0 [ 2368.901840] CPU: 0 PID: 11608 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2368.903292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2368.905047] Call Trace: [ 2368.905605] dump_stack+0x107/0x167 [ 2368.906384] should_fail.cold+0x5/0xa [ 2368.907207] ? create_object.isra.0+0x3a/0xa20 [ 2368.908193] should_failslab+0x5/0x20 [ 2368.908996] kmem_cache_alloc+0x5b/0x310 [ 2368.909855] create_object.isra.0+0x3a/0xa20 [ 2368.910782] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2368.911870] kmem_cache_alloc_trace+0x151/0x320 [ 2368.912858] alloc_fs_context+0x57/0x840 [ 2368.913721] path_mount+0xaa3/0x2120 [ 2368.914512] ? strncpy_from_user+0x9e/0x470 [ 2368.915422] ? finish_automount+0xa90/0xa90 [ 2368.916341] ? getname_flags.part.0+0x1dd/0x4f0 [ 2368.917386] ? _copy_from_user+0xfb/0x1b0 [ 2368.918275] __x64_sys_mount+0x282/0x300 [ 2368.919130] ? copy_mnt_ns+0xa00/0xa00 [ 2368.919969] do_syscall_64+0x33/0x40 [ 2368.920752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2368.921836] RIP: 0033:0x7ff784b43b19 [ 2368.922620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2368.926502] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2368.928333] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2368.929840] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2368.931347] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2368.932858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2368.934360] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2368.948997] loop3: detected capacity change from 0 to 135266304 [ 2368.969980] tmpfs: Bad value for 'mpol' 23:03:27 executing program 2: sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="40000000010200000000000c000005060007400001000006000740000400001c0002800c000280050001003a0000000c0002800500010088000000"], 0x40}, 0x1, 0x0, 0x0, 0xc81}, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3da81814f972659b03a6b2676a63eb1fddc76ba417090893e109960536a93729e0acde6264fd67e6cb", @ANYRESHEX=r1, @ANYBLOB=',\x00']) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:03:27 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x900) 23:03:27 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x9, 0x8, 0x3, 0x6, 0x0, 0x400, 0x88041, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x18404, 0xa8, 0x4, 0x4, 0x2, 0xdc3a, 0x8000, 0x0, 0x10000, 0x0, 0x3}, 0x0, 0x9, r0, 0x0) 23:03:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x40) getdents64(0xffffffffffffffff, &(0x7f0000001e00)=""/4100, 0x1004) [ 2369.137805] 9pnet: Insufficient options for proto=fd [ 2369.164658] 9pnet: Insufficient options for proto=fd 23:03:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xf5d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:03:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bd", 0x74, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:03:27 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:03:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 12) [ 2369.294846] loop3: detected capacity change from 0 to 135266304 [ 2369.303968] tmpfs: Bad value for 'mpol' [ 2369.378747] FAULT_INJECTION: forcing a failure. [ 2369.378747] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.381269] CPU: 1 PID: 11649 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2369.382728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2369.384466] Call Trace: [ 2369.385021] dump_stack+0x107/0x167 [ 2369.385788] should_fail.cold+0x5/0xa [ 2369.386588] ? legacy_init_fs_context+0x44/0xe0 [ 2369.387566] should_failslab+0x5/0x20 [ 2369.388377] kmem_cache_alloc_trace+0x55/0x320 [ 2369.389394] ? lockdep_init_map_type+0x2c7/0x780 [ 2369.390393] legacy_init_fs_context+0x44/0xe0 [ 2369.391327] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2369.392385] alloc_fs_context+0x4fd/0x840 [ 2369.393253] path_mount+0xaa3/0x2120 [ 2369.394049] ? strncpy_from_user+0x9e/0x470 [ 2369.394961] ? finish_automount+0xa90/0xa90 [ 2369.395874] ? getname_flags.part.0+0x1dd/0x4f0 [ 2369.396853] ? _copy_from_user+0xfb/0x1b0 [ 2369.397715] __x64_sys_mount+0x282/0x300 [ 2369.398559] ? copy_mnt_ns+0xa00/0xa00 [ 2369.399366] do_syscall_64+0x33/0x40 [ 2369.400148] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2369.401209] RIP: 0033:0x7ff784b43b19 [ 2369.401976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2369.405775] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2369.407345] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2369.408861] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2369.410329] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2369.411811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2369.413288] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:03:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x26) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x1) 23:03:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) r1 = socket$nl_generic(0x10, 0x3, 0x10) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x20080, &(0x7f00000001c0)='U-') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000040), &(0x7f00000000c0)={'U-', 0xffffffffffffffc0}, 0x16, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x188) 23:03:44 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0x0, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:03:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 13) 23:03:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bd", 0x74, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:03:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_setup(0x6c75, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x402}, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd, 0x11aa7d53, 0x0, 0x0, 0x12, 0x1, {0x0, r5}}, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x5, 0x0, r1, 0x0, &(0x7f00000003c0)="130eb04bcaffc58c903f4283bf0121416fdd68cb1dabaa3b41e708bab5508ee172f274e92605814cab8bda70edd6eb635d4ccf258bec2a2fd697e9a688317a77309e8d2906545dad8a0d2c95649140465f859df28799ead46e24f44a5322bf71fbdeb354bdc415111ffdd722227f9a6aa394d7860c8bf953f436cf301583bfb5ab28685cc3a87f495a60e03c188c1c04d8724098c4db719469140bc3ef48135eca4f3e3be18894683815aa04da9d6069f1b9449cda35abaef5ba08e7d398fdd79c56891ad03649d67729", 0xca, 0x80, 0x0, {0x0, r5}}, 0x457) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0xffffffffffffffdd}], 0x1) 23:03:44 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:03:44 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf00) [ 2386.360992] FAULT_INJECTION: forcing a failure. [ 2386.360992] name failslab, interval 1, probability 0, space 0, times 0 [ 2386.363958] CPU: 1 PID: 11658 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2386.365721] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2386.367864] Call Trace: [ 2386.368566] dump_stack+0x107/0x167 [ 2386.369506] should_fail.cold+0x5/0xa [ 2386.370495] ? create_object.isra.0+0x3a/0xa20 [ 2386.371682] should_failslab+0x5/0x20 [ 2386.372678] kmem_cache_alloc+0x5b/0x310 [ 2386.373717] create_object.isra.0+0x3a/0xa20 [ 2386.374838] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2386.376134] kmem_cache_alloc_trace+0x151/0x320 [ 2386.377352] ? lockdep_init_map_type+0x2c7/0x780 [ 2386.378589] legacy_init_fs_context+0x44/0xe0 [ 2386.379508] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2386.380808] alloc_fs_context+0x4fd/0x840 [ 2386.381878] path_mount+0xaa3/0x2120 [ 2386.382838] ? strncpy_from_user+0x9e/0x470 [ 2386.383938] ? finish_automount+0xa90/0xa90 [ 2386.385078] ? getname_flags.part.0+0x1dd/0x4f0 [ 2386.386274] ? _copy_from_user+0xfb/0x1b0 [ 2386.387365] __x64_sys_mount+0x282/0x300 [ 2386.388402] ? copy_mnt_ns+0xa00/0xa00 [ 2386.389416] do_syscall_64+0x33/0x40 [ 2386.390374] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2386.391687] RIP: 0033:0x7ff784b43b19 [ 2386.392602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.396364] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2386.397905] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2386.399346] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2386.400799] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2386.402241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2386.403680] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2386.489435] loop3: detected capacity change from 0 to 135266304 [ 2386.521161] tmpfs: Bad value for 'mpol' 23:03:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5832, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:03:44 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:03:44 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x6, 0x7f, 0x1, 0x81, 0x2, 0x3, 0x8, 0x38c, 0x40, 0x2f, 0xa37, 0x3f, 0x38, 0x2, 0x1, 0x8001, 0x400}, [{0x3, 0x10ac, 0xffffffffffffff29, 0x3, 0x4, 0x0, 0x100, 0x10001}, {0x4, 0xffff, 0x3, 0x9, 0x9, 0xafa, 0x9, 0x75c}], "defd27ce6fa5d5b234672c712960ef30d391b17d24a790487cba5d22f99208859b4ba9a1a41d3e62fc19c3c9fcbfd02a997eb0c83d3ac32058144908c7a6d2a6e9ad2f43b6f01ee232c6003f", ['\x00', '\x00', '\x00', '\x00']}, 0x4fc) fcntl$getflags(0xffffffffffffffff, 0x408) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:03:44 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x6000) 23:03:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:03:45 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = clone3(&(0x7f00000002c0)={0x100000000, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180), {0x1d}, &(0x7f00000001c0)=""/159, 0x9f, &(0x7f0000000380)=""/4096, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7, {r0}}, 0x58) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x9, 0x8, 0x80, 0x40, 0x0, 0x3, 0x100, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x1000, 0x200, 0x4, 0x7, 0x8542, 0x20, 0x0, 0x0, 0x8000, 0x0, 0x8}, r3, 0xc, r1, 0x3) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) 23:03:45 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0xffffffff, 0xdb2a}) 23:03:45 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) 23:03:45 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/125, 0x7d}], 0x1, &(0x7f0000000180)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}, 0x40000000) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x9, 0x34, 0x0, 0x1, 0x0, 0x1, 0x448b0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x40c80, 0x101, 0x6, 0x6, 0x80, 0x3f, 0xfffd, 0x0, 0x3, 0x0, 0x5bc}, r1, 0x6, r0, 0x5) chdir(0x0) 23:03:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 14) [ 2386.837895] loop3: detected capacity change from 0 to 135266304 [ 2386.878486] tmpfs: Bad value for 'mpol' [ 2386.885370] FAULT_INJECTION: forcing a failure. [ 2386.885370] name failslab, interval 1, probability 0, space 0, times 0 [ 2386.887969] CPU: 0 PID: 11706 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2386.889416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2386.891137] Call Trace: [ 2386.891734] dump_stack+0x107/0x167 [ 2386.892505] should_fail.cold+0x5/0xa [ 2386.893292] ? v9fs_mount+0x5a/0x8f0 [ 2386.894058] should_failslab+0x5/0x20 [ 2386.894862] kmem_cache_alloc_trace+0x55/0x320 [ 2386.895809] ? v9fs_write_inode+0x60/0x60 [ 2386.896680] v9fs_mount+0x5a/0x8f0 [ 2386.897417] ? v9fs_write_inode+0x60/0x60 [ 2386.898289] legacy_get_tree+0x105/0x220 [ 2386.899122] vfs_get_tree+0x8e/0x300 [ 2386.899899] path_mount+0x1429/0x2120 [ 2386.900709] ? strncpy_from_user+0x9e/0x470 [ 2386.901607] ? finish_automount+0xa90/0xa90 [ 2386.902500] ? getname_flags.part.0+0x1dd/0x4f0 [ 2386.903467] ? _copy_from_user+0xfb/0x1b0 [ 2386.904362] __x64_sys_mount+0x282/0x300 [ 2386.905199] ? copy_mnt_ns+0xa00/0xa00 [ 2386.906016] do_syscall_64+0x33/0x40 [ 2386.906789] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2386.907856] RIP: 0033:0x7ff784b43b19 [ 2386.908640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.912460] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2386.914042] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2386.915508] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2386.916998] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2386.918481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2386.919959] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:04:02 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x9900) 23:04:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070417a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f79fb77689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0b7e48d66203f38287876724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a2ffffff7f5ef37a"], 0x420800) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) 23:04:02 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0x0, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:04:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) execveat(r1, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000300)=[&(0x7f0000000100)=',H!\x00', &(0x7f0000000140)='\x00', &(0x7f0000000200)='wfdno', &(0x7f0000000240)='wfdno', &(0x7f00000002c0)='trans=fd,'], &(0x7f00000005c0)=[&(0x7f00000003c0)='{\x00', &(0x7f0000000400)='9p\x00', &(0x7f0000000440)='9p\x00', &(0x7f0000000480)='}*\x00', &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='$[\x00', &(0x7f0000000540)='trans=fd,', &(0x7f0000000580)='trans=fd,'], 0x400) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000000)="1f", 0x1}], 0x1) umount2(&(0x7f0000000040)='./file0/../file0\x00', 0x5) 23:04:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 15) 23:04:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:04:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) clock_gettime(0x0, &(0x7f0000001080)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40)=[{{&(0x7f0000000000), 0x6e, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/4, 0x4}], 0x1, &(0x7f0000000140)}}, {{&(0x7f0000000180), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000200)=""/95, 0x5f}], 0x1, &(0x7f0000000380)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000440)=""/57, 0x39}], 0x1, &(0x7f00000004c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x110}}, {{&(0x7f0000000600), 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000680)=""/88, 0x58}, {&(0x7f0000000700)=""/138, 0x8a}], 0x2, &(0x7f0000000800)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000900)=""/253, 0xfd}, {&(0x7f0000000a00)=""/196, 0xc4}, {&(0x7f0000000b00)=""/17, 0x11}, {&(0x7f0000000b40)=""/204, 0xcc}, {&(0x7f0000000c40)=""/191, 0xbf}, {&(0x7f0000000d00)=""/18, 0x12}, {&(0x7f0000000d40)=""/221, 0xdd}, {&(0x7f0000000e40)=""/65, 0x41}], 0x8}}], 0x5, 0x101, &(0x7f00000010c0)={r1, r2+60000000}) readlinkat(r3, &(0x7f0000001100)='./file0\x00', &(0x7f0000001140)=""/140, 0x8c) 23:04:02 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a600000000"], 0x1c}}, 0x0) [ 2403.838911] FAULT_INJECTION: forcing a failure. [ 2403.838911] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.841826] CPU: 1 PID: 11729 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2403.843561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.845587] Call Trace: [ 2403.846255] dump_stack+0x107/0x167 [ 2403.847160] should_fail.cold+0x5/0xa [ 2403.848114] ? create_object.isra.0+0x3a/0xa20 [ 2403.849261] should_failslab+0x5/0x20 [ 2403.850215] kmem_cache_alloc+0x5b/0x310 [ 2403.851222] ? cred_has_capability.isra.0+0x152/0x2b0 [ 2403.852503] create_object.isra.0+0x3a/0xa20 [ 2403.853618] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2403.854877] kmem_cache_alloc_trace+0x151/0x320 [ 2403.856073] ? v9fs_write_inode+0x60/0x60 [ 2403.857113] v9fs_mount+0x5a/0x8f0 [ 2403.858026] ? v9fs_write_inode+0x60/0x60 [ 2403.859057] legacy_get_tree+0x105/0x220 [ 2403.860107] vfs_get_tree+0x8e/0x300 [ 2403.861068] path_mount+0x1429/0x2120 [ 2403.862057] ? strncpy_from_user+0x9e/0x470 [ 2403.863193] ? finish_automount+0xa90/0xa90 [ 2403.864436] ? getname_flags.part.0+0x1dd/0x4f0 [ 2403.865746] ? _copy_from_user+0xfb/0x1b0 [ 2403.866817] __x64_sys_mount+0x282/0x300 [ 2403.868009] ? copy_mnt_ns+0xa00/0xa00 [ 2403.869097] do_syscall_64+0x33/0x40 [ 2403.870216] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2403.871613] RIP: 0033:0x7ff784b43b19 [ 2403.872620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.877695] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2403.879769] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2403.881863] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2403.883838] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2403.885917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.887746] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:04:02 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) [ 2403.968501] loop3: detected capacity change from 0 to 135266304 [ 2403.979322] tmpfs: Bad value for 'mpol' 23:04:02 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf000) 23:04:02 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) 23:04:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:04:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x6926c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x6400, 0x0, 0x0, 0xc53716d6e1b33bd5, 0x0, 0x0, 0x10}, 0x0, 0xa, 0xffffffffffffffff, 0xb) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x9, &(0x7f0000001600)=[{&(0x7f0000000180)="fc62c59bddc09e89874a533419f03b5a56df1c7b0f468abec01044b2025b691b0e846ef635ead46cbf", 0x29, 0x1}, {&(0x7f00000001c0)="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", 0x1000, 0x7fff}, {&(0x7f00000011c0)="e8aa34d23b88ea10ecf4bd88d574fe1168e3e3de62a2b46e3cff99009e86fcc21b7f4a5c5e69aa60f49aab810257a49cdea8299dbd93c6fd0f82728e16e61d21bd834fac9d9f801efca4b872b888f4099549808c0ed9071bdb277b60c189f2a890865e42e057a5b7885ddf9a085cfb77320e0c34ee7dda96f8ab971f64c3962a635ce128be4cb0bd5272eda33ef60f02f1a84a351da12c9e6c2747b50570e3c9a0749854a04015f455bbba8ffe69622e8cfa234635c05c42ef8d5c31a3925d1748cee5fc51eb3a46b06927a2b79c811cfe", 0xd1, 0x35}, {&(0x7f00000012c0)="050d99d578e52f341b46540363f0111d4e83dfdf3601aeb67010305039e51ec47649336532816a347498cc73b65b50c251a9e6d4c5e7f5ad2597f7fc459b3c38603bb242e90d7c7ad13d351789fbb274f347db493f221eb75788fd2b6d83e3286553160a774bbd7f86e0a362a4f33c901929f5d653901060cea31af2b5acf50a8a6eaf3e7e69f106d6185e", 0x8b, 0x4e94}, {&(0x7f0000001380)="2cff9fa7644869af6008c329b305465ab752094b0a488aa2ccc9867e3d992aca5117d980ef43c9dcc4c162992d5c1e6c9e23cb91da9fade1dd46294316ab2e99bce4694510273f17b7bc57eda020ea5d68508fca250bb10c69074202", 0x5c, 0x8}, {&(0x7f0000001400)="0438d443b2f599a94c6d4bb7f1d5e55b9517eca1dcb6ab2b038207bfae3e2dc0d115acbe9dc4e7dff5e8de65fa623f72133ddde044c950c6bbcecc50bee2904e3138c2f4a17375dd818732202b8e540f7be65ef2a7264d8d77", 0x59, 0x7fff}, {&(0x7f0000001480)="f712e8f51258d29fcbf3e4374fd4f4e8147295a11dac731aefc5c80922f7ead434bf599e93a513eb55a83c3b4433092b0403a2a0b3925fe2ae50e64dd5e439ba136fb50bed8b62f386b7dadc775cfe110ea85d490b89c68157a22503e1efc6dfd1469a243f589c645bbbe74ea0c377207061c6817c341b222166b3b61eb0d96be2bb890859a7ebcc0953bf201a274a9db5dfc77497575f4a9b971d6b74847e4800a1a9b70126a6c516e8436546461750e9919625e33de7427d4da9991f1b7936438b0d03fe60317365d05f22d78261112ba113587f77dd5f4b0df1f58685a7d4991fd0d22681694d2be4988dc78d9f1d", 0xf0, 0x3f}, {&(0x7f0000002e40)="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", 0x1000, 0xe8}, {&(0x7f0000001580)="c99ecef7e236e8183a167a88b5692b93d0c851ecbc02f5705998eb7703bff7b9c2292956fc6161cd5c9b480998e62a5d09222ab699ad4c2856ff580e3841e65f5b53f1bc4984f802ea60c105", 0x4c, 0x7f}], 0x1010, &(0x7f0000001700)={[{@stripe={'stripe', 0x3d, 0x80}}, {@sb={'sb', 0x3d, 0x8}}, {@acl}, {@auto_da_alloc}, {@delalloc}], [{@fsmagic={'fsmagic', 0x3d, 0x401}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@dont_appraise}, {@euid_gt={'euid>', r1}}, {@obj_user={'obj_user', 0x3d, '*'}}, {@smackfshat}, {@smackfsroot}, {@pcr}, {@context={'context', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:04:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1, 0xffff57e9, 0x4) accept4$bt_l2cap(r1, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x80000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x11000200}, 0xc, &(0x7f0000000680)={&(0x7f0000000780)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="040026bd700039d86758b0c465a576206a5526bc9caa3cb246eb0b9756333fc95a7e00000000", @ANYRES32=r2, @ANYBLOB="1a00c70006015b000006080402010903100117174644ba69289b00003200c7000006ff0420060305340707021f010107fb064002020100033f020603ab030701030020030002507d1592c391b28100002000c700000204067f0575040907b002020200043f068007c1f53b3fe711c8fb"], 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = dup(r5) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1, 0xffff57e9, 0x4) accept4$bt_l2cap(r6, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x80000) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r6, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x11000200}, 0xc, &(0x7f0000000680)={&(0x7f0000000780)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="040026bd700039d86758b0c465a576206a5526bc9caa3cb246eb0b9756333fc95a7e00000000", @ANYRES32=r7, @ANYBLOB="1a00c70006015b000006080402010903100117174644ba69289b00003200c7000006ff0420060305340707021f010107fb064002020100033f020603ab030701030020030002507d1592c391b28100002000c700000204067f0575040907b002020200043f068007c1f53b3fe711c8fb"], 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x90, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0x7f}, @NL80211_MESHCONF_HWMP_ROOT_INTERVAL={0x6}, @NL80211_MESHCONF_PATH_REFRESH_TIME={0x8, 0x9, 0x1}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2a4, 0x7a}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_MESH_CONFIG={0x2c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_TTL={0x5, 0x6, 0x2}, @NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0x1}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x8}, @NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0xd6}, @NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0x53}]}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x40000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:04:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 16) [ 2404.198990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2404.208779] FAULT_INJECTION: forcing a failure. [ 2404.208779] name failslab, interval 1, probability 0, space 0, times 0 [ 2404.211321] CPU: 0 PID: 11756 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2404.212760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2404.214498] Call Trace: [ 2404.215053] dump_stack+0x107/0x167 [ 2404.215812] should_fail.cold+0x5/0xa [ 2404.216609] should_failslab+0x5/0x20 [ 2404.217414] __kmalloc_track_caller+0x79/0x370 [ 2404.218363] ? v9fs_session_init+0xa7/0x1680 [ 2404.219282] ? kernel_text_address+0xf2/0x120 [ 2404.220220] kstrdup+0x36/0x70 [ 2404.220894] v9fs_session_init+0xa7/0x1680 [ 2404.221788] ? lock_release+0x680/0x680 [ 2404.222380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2404.222612] ? find_held_lock+0x2c/0x110 [ 2404.222639] ? kmem_cache_alloc_trace+0x151/0x320 [ 2404.226659] ? v9fs_show_options+0x690/0x690 [ 2404.227768] ? trace_hardirqs_on+0x5b/0x180 [ 2404.228841] ? kasan_unpoison_shadow+0x33/0x50 [ 2404.230019] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2404.231055] v9fs_mount+0x79/0x8f0 [ 2404.231783] ? v9fs_write_inode+0x60/0x60 [ 2404.232618] legacy_get_tree+0x105/0x220 [ 2404.233450] vfs_get_tree+0x8e/0x300 [ 2404.234201] path_mount+0x1429/0x2120 [ 2404.234971] ? strncpy_from_user+0x9e/0x470 [ 2404.235851] ? finish_automount+0xa90/0xa90 [ 2404.236734] ? getname_flags.part.0+0x1dd/0x4f0 [ 2404.237784] ? _copy_from_user+0xfb/0x1b0 [ 2404.238635] __x64_sys_mount+0x282/0x300 [ 2404.239458] ? copy_mnt_ns+0xa00/0xa00 [ 2404.240259] do_syscall_64+0x33/0x40 [ 2404.241025] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2404.242070] RIP: 0033:0x7ff784b43b19 [ 2404.242825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2404.246557] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2404.248111] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2404.249567] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2404.251014] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2404.252462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2404.253982] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2404.263723] loop4: detected capacity change from 0 to 65024 [ 2404.277379] loop3: detected capacity change from 0 to 135266304 [ 2404.285554] tmpfs: Bad value for 'mpol' [ 2404.317937] loop4: detected capacity change from 0 to 65024 23:04:23 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0x0, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:04:23 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x30000) 23:04:23 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) sendmmsg$inet6(r0, &(0x7f0000004300)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0xffff, @empty, 0x80}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000000c0)="b583e0d135bbde6ad78ca104015625d2e7bf81ea8b1124b30fb0ced50cc0082e3b8285e0230be9a660092decd51fab7cc648be0f1d9dfbc7b060fec0253a34e09321d07d6b820fd27c326c02e40772f2119d22bf9d31fa6a122b710a3de8b37a2428677f7b95917a36a221442d0e93873620a8473f53945a3354abdfbf8f938a553a8dd4deea79b246ae930edda66ec334f8b6cf7fa489a60f3f702a882ff5d6fa408d6aec9618bd967b95f6cd1004bb8c8f97c40be54960eac0430231723223ed5ecb6afe668fce152e1ae8bc0c8f5db52ceaf9272db00dc7db2bf6ecac77522bc830f37c1d571e4b79ecf78efb1aeca657780d", 0xf4}, {&(0x7f00000001c0)="53efa7f64675c2ff5722740ff66158d17636d93e6b750af57255d99316cc8828ee331e6aef904b2aee695e413ec0a9b391d1b75b0d77a2e7ea9ecf7a0ad315dde0284d20006f37f3e9d1f1d2494d46ab51e8bfe4e9074759e468c878b9488a30270381", 0x63}], 0x2, &(0x7f0000000280)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x3c, 0x4, 0x2, 0x2, 0x0, [@mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @hopopts={{0x20, 0x29, 0x36, {0x33, 0x0, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x3}]}}}, @dstopts={{0x38, 0x29, 0x37, {0x32, 0x3, '\x00', [@hao={0xc9, 0x10, @mcast1}, @pad1, @jumbo={0xc2, 0x4, 0x30d}]}}}], 0xc0}}, {{&(0x7f0000000380)={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x5}, 0x1c, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x1000}], 0x1}}, {{&(0x7f0000001400)={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c, &(0x7f0000001c40)=[{&(0x7f0000001440)="d7b15f70937c4c04c3dafe63e62085af82543edf7bbcee00650854f9e2846c5602dc44440e09a05e4a64390a563d59a458992e782bcbf123b85f183771f6b55c4e05e750c933cc2cdb1145f2c14fb3422eaa02ec8232bc17c6b159cdf20ea5d422a888d1e294bd14ee870fbf66dae86db861b4fb9d3a75bf32a1d1d73146e4136372464f6d899a7d99c969bbdd8acb0b24f9bcbc26dd869a9ac00d20aff8ed4d1076c73443b83e5cb636d4ea8f6f61d40f1ba30c829589529b937316abae28cda954181ae7b3e730ae62c87ac6c71b44bec74a89a8ba7d5db8a02f8640", 0xdd}, {&(0x7f0000001540)="1590dd94017847a808a9e637f543af2dbbeb839b9b4d", 0x16}, {&(0x7f0000001580)="a46b7ef051f8d5fe01a6c01453cb5f1f4c4f37fcda28e95083a7c8f0f0718037d7c084197a9d43be250f0985a5def4e39de83bbd57054be0bd0e3e75e557120028e246461ba38a13445972d97c7c6c434e1f8007dbbf00422136371c236df2c8e896b51f3f007ff1454ef9d178bc692321d5bbd5caae5375cc7ee578124cfebaf50d7c8444111c0a", 0x88}, {&(0x7f0000001640)="cdd6fc4e4dbbddb4fc72118c3bfe91ffa3d53549a51fae5e13101da1283bac4d1fafce23d995", 0x26}, {&(0x7f0000001680)="c6babd147580d0012f26febc87323b988de9114c65143b9d472dc9ac368f5a6077fafafc8aa657308a5982c8d69812b092175c8ea02b03d8e5e7a47634b68e8eef41472b54e88b9557d91cb9f71f068431d975d05ffd75439f59919760213ba74ac0406ddd95fa06d2980521cbfbfd15db04a7f757d1c20c84a9331404e5fbe4188f911b92b862c1a41ee904eff6950b7d5a8b791fc632adddf060644ee2aac137e875916217ce85282e93994393e966a0b996b2a191c9b4682731ccc74b7cd5a5ef83d32f24c9b5c0792272781ab8404221b02fba118def18709763f40063badde86ab638487ff2bf", 0xe9}, {&(0x7f0000001780)="66f24eabb1ce5f91234e5a326f01105bea116fadc7534b4c2b272e7fdbc795d5326268668e9adc659c476365be441485cb47981681faa2730060b17612065f6a7d0dc0a1458a5e6c42d914e0ca07f34c3292769c7b9e3b554a5c51e15f808165835465877c3c51bef2882b43d3b38f528ee2ae76e605e991746b7f0acdf2f5250b76ccead018699586f77cadee024767ea46c2c43020c26f41e1797d89e261d4438b2693ac2fa422f827bada094d", 0xae}, {&(0x7f0000001840)="27ecd8baab1677fdba617f6fb87904d0ccd3fcba0de67738232b2250874ddfe87b8fc38e8a0a1a596a82b926e95f088d4c65f673e9ada9e238aa6f94b45cc05ab3d810468d026e3df88673472a71bf453a467f5d68fcaf0faa21fc6e2b3d03cde6fa296ab21181c75b6a7da061caf8f19f31aead4745919a24f9a73c45ebb7aaee373314e210a9e482bf75b2bcff0a9347cbdd289e0472c7272d887261541b47320a32b2d1c65cfe427cea1614ac12fa90a687b91dc67701987b01b0835a16dbda3e2c423951c73ec38a5b69d26f1684ca7b3c5ff7524ea5af09c638969e2bb465d644e4ca14f43cdd2807", 0xeb}, {&(0x7f0000001940)="1e00fcf655dc8dae639a45b95f642e58968ad21915d4f35af80b83bd11b425061eb2f1ac1eb2307b757472fe01d90150d9260c741ebdfb7ac30c322afeba55a919dbe6906bc8368161ec1c76076359fd63ee88317d850504406145fa4f8d7eb94cb6efbf566bd107213470a66363a78fbfa2f0fc7d67d3f95ec6de30492a02c48096b64d9be20164b312900fd3a5d12e92446e75d69d301a74b663dab9215eb763d1632e7954c411caba7271d8e6491ff30af702a9c692543dba4719ec82270fba0e96ddbc011263e9ab", 0xca}, {&(0x7f0000001a40)="eb26709724693d6ddb0569f29e2f1757c846588d784440cdc61f9fed0fa12848a07e573b5d1ce0fd36026a53ae57261bcd98011c3974071cce423657ce50bef20efabdfcb0779872f317e2f9bfec2619e0e693dcebf059955226b14d8137c690c443779501616792249bc1efe1f47dcbf3cf265b4ff3f64436269001bb88df190002bd935f9daac18b8ba6c342659a00e9c52e41ee141cddad2a27fc681b20039cb311a474a3c87901814804dc96f0161cdcac5f8c76edb68a4e4a3182f20180d178e2adfc267adc25ed1bbe1d954a35bd04dabbdea965e9bf4bdafdad60d26e6e7e1e1217aa73740756324f", 0xec}, {&(0x7f0000001b40)="b8035709652d50766011c24263e8dc448818bf2adda109bf486e12932a4415d6154db61f61375518ebb42096031798d7539db3fd037bb07754afd6c8846fce17da059f88eb8329f9089b3b74327adce0987d22b3494f43a7b9ee949f35994a3ad407bb0cb88c56fe528fb98fe3913bedd79d3bfd6fb72a1c9ccfa3eef0100b923062345afb5f7c9dc78976e9679feabab56192fadbc12637da0e4b1bcddee38fe68bcb20bd8f55f2864e3aee4108fcc5ff2e425bb9130829f1d00823337f252dd428a3d2c49620c17aa97cf6bd77da97c9176cb5d36b0094aab105125664acf0bcd57a91bd", 0xe5}], 0xa, &(0x7f0000002e40)=[@tclass={{0x14, 0x29, 0x43, 0x1}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}, @rthdr={{0x48, 0x29, 0x39, {0x33, 0x6, 0x0, 0x1, 0x0, [@remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x5}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000001d00)="d2c5a6bb54e97ce77b4863d0ac2cb51ccf954c67f152f8b25416ce66aa29cc19c1a183f6e1a7fd24249292e285d3c09bef792f7a94c962bf8cddc2df2cffa8cc517e4a8e0e3626fb77", 0x49}, {&(0x7f0000002f00)="cac4da57f8ac2d13a993b61df5c876b3f7f7e3bb6f90fd92395433afba70b8183f", 0x21}, {&(0x7f0000002f40)="f4c998bec506884d63ae344fc842061d45a2e91e9dd69ee049c8d03428c8e59e3034ae2d2f16a6e5c21e47a96d9e7c178256a46a46b6f218a038d325fdb2e5156b6cd8b1f5a58b983ec805c66245cbd04207cddf44c5f1be920ef05a3e4e1dceb96a916d75938573befc56dc60edd41516c0f45764aa4c13fecc3f78ca4f01608f1354fdaf7fc1250df2a32242e0592c7e3da3fb4398f7e76d8a3ce70ecbc98f6590e23b068aa681c136270c3596ec01f6cd42ad3a60c076d1672e78da1f31224c1064c5dc99aa552d", 0xc9}, {&(0x7f0000003040)="59e5e582dd53610bbf1de121ea697fcb9f756ebb5f7bc360652384dc1ad98a8639b579faeefcc3c6eafd30691af943262b4ca7ba84f300cca91359d237a6f3e1124814103e2744749f5e83ab01acfd77f682309abc7a3b345971de5aed015427337a579f2d14c6ea1b06b3e1e332d671c5096d1f067266b0fd771827729c984fc3c53c5cffd30cc26caa071d9319892bfe3c5416eb10e5b16e2a51bcde509d464cc59d58bcfb728d3375c2c8ce770f5e0651bedd38493f1a8438d3f0e6c3625f3a44f97d574c8b2f9579972edbe05ea4b6ed925f3fd5a150ecff6e71782a1ec97951de", 0xe3}, {&(0x7f0000003140)="6b76d7b41a61e98a7b37342084b08e3211e95d9a4de841a7690478b9653f9ab4d0cd6a25fa3d6cd9dfeab23719f0a4e6957a302ea8be62abfd6e6f41be408105371749e10b00257ea937b3efd1498f3b63b518e3af8580e960ed50f766685b08eae173a7377d64ca8879b4d2e404896da1d83d011e1089c38c2a779f4e81190709496b806d55ad1e221fec0ed1504b5b286f7dd123a8aa59e5ce68a9c5dcb00404a0043026d3972ab4d8c9988e30269792d2c9f5f86accc769526e045a9ab8d52e82870d0b9a84af85c60e3264ce8c6a29a1a3da5b84e715207dfd83694033ddb486d077507329b9e96011205a65ea2ffe80d52012d5f6e0a7c0e982bdd4660cb4e516debd018068845c17961f98db6fdbe1095d27d85d4067db2509359b7083897594aaae4cb5801f33547919f553efb1804d2b4a072f10fb22cb0b64982e48e2d813271515489e920c3a39d124d163403da2f062cd374c8bdecd9ff1c817d1e89e15d95a81ecae613a0c811ab279bfcdc67b1dfd650725aee15e9a55c157eb7860f51f230879088f2b9fe55aaefddc676e6def5d882f38a55cd56508c04c0f21136cae3b3da2ed80111a106349d0b1d0aeb45d025e798a0cc620dea8cc576a0b31304ca0fa17c93f5fd59e9f1715f30987f46667f89bd9d7b94065d192e2525444a856bc3eb7bd86e6876aa270b39a8db1fde99ec30fc109ac254d7d5938f7f26a2bdc3da5ef7f0ba5fd3e98a9e44cbe2310679a9c511eafd122b5efdb934efc0f56cc25f54f6d9f6d2de3e66ee5b09d0eae679b940f17e05a784ef77042de1f47f9e45926e78eb4b20f5d6ba36dd098ced881998e3f66680c5d18aaaf923dda18f1bc514c57b284bfff52507ffa28bb463863c29c2855b3daf472c1b5664a8d37ec765b6a3ee7106019788afaa8ed66a98e9ddd85b37776ff6d5e26dbb334f4b14f79ef8206d970584ba6af98fbb0c43af61c34bb2602dbd1088178be52ba934455ecdb67290203c09905e2323af94349324e5c29bea3f4b6fe2320b91e1e3d740861bc1517bef9c3c712b61ded0ac2d215cbff66989d8bef8f4c475374b73a92e124bc35edc499d245b37ea3f0cac9bb5f2346096d58d179aa58d8517e13cf46301c011f4bd7e4bd0486837b46bcefa0eab1510c0b6fea9cf09724194b99366e86ffdbc44ef977f17ad2b3e2a0405ef4670bb94f068e4f9e34cd32d1b021b6afac958319f7c4c380a37db1861f6d1ee4751994ae8cbf8da9c835edc002849e50f1e6b0771c478907540e6814a418cada63377d8a7a3909db6c7d10b9428ac679d1a4b225244683b0383e83f73ff47296a1b24626cf92b83df83d6fc66ae44eda13509d206a883de8532234f27e1f810f625351e38dd8e3625aefc7391eb25939685556d6314dce939c59d21d95858caa6465e9eb4dbc1ace29d0d2022d0f1d2e805109a15419aea6fff39617044465eef0e48335c0f98bbab0ee80d50efcfbfa08001e5dd3acb8a6184a6fed44889bc4ac98159cf923902422d61965ce9a0198f7a6f008c9925672069307d7b3d94a345724c2ea8657a59c3ff72becd992aa8ad0a4b1a9cf12344dddcc77171e6e44c6164732d537a695e535925945d41b7d75b09a0fe41c2b2cbb8cafa3d270a0934db78d7bc08efca201554c7eaaf3c35fc3bebd5d65192fec1939d7217e89db599efb6b32f28c8c52e1c9e3ee1534190d6453f2ff9ed95351b79048bc69ef252b863dd5ecc5761d63325b14d79b3c0b576e85bdbd8fca9d38fddbe5e96f27845be8d645da0a4da84c3bf2c23486528a36db2354e7f0c4bd156675d868cdb2f149144bb40d30a42feab72778b1e8d29889bbdacc4bad38c3ba24bf9320bace51452e496429dc01c762b7ca38038d0b82fca32668ad2c5af3e65836d9f40770916c1763f60c88a55482e5bf4ee77b8fee6c2c591459b0af1f2aeb50bd9b1cb7a34d0aae17ae1e01a18cdfa5b51ef62beeb475e318677eac1b63996cb80e9f02c4bc672701a71a5307c81d52b1c8ef6ca70e194c9351c9b906ee1cd3092f1fea51b7c7cf780d64f468ce20e76ca9d19f3f8a05347e842ab6500cf55e7b690d8353fd827de8a18b5d67fc1aec7e09bfed8d751d6ded4c090dff25b740c3297cb307e6bba5024838c9d479a57aec9f2cf9edfd2d8d896bff50d159857a75ba737ac421d88e6a7bb7827dfb0da3e49ed2b200cb5d65e8d577b9e2173dd95b6b300854a7eb0e2cafd8851c26151486cd3e6c288aae83a03b5b2acf5bfe109d569913972d61081053fae875c10f2808db21168ec0ed686d9861a253fa81d95565ecc0f5dd5c10dd4a1aaa3adadbd9d093a918b39e560acc7581caba48a52914a2637ec6b2610df8b561a13c408670851edc39035cb30d170a71acaa79ceb15a887cc9b6dc663d0f7ed7215fa32d14fff509b195db886c8022dc7628b6abed5e83c840e406a14d6653bcd04c364187b8c03e2900c8ae1d8cccbdb78a2289ca9051795f80da2daae8addb06af017a04be6d1c4013cba57802686167b5eeb37d9c6a2807528cf998c07bf88ba2b32369688bee8d882874ca8d08540ad4348b56604d8ef8dd87093252ad4c951c147352b1f7a83c5fc32ca8ccbc7a76be1902fbfef6f4c3c81161f45eaa8904760a4ec14523a923497351b5f00018b8fddb36e890d68e1260a30ba2759e3d908c0a22fa8a3d388449b1b7285c8a82dd645f996ef98b61fa5ee1e8ba34a876492d7113de2da2aee57b6ad8c9ba240f548895765f648c8f6ea61ac0aa1aa0afc62f90381d98d5186a35e2357a97c02df74b4af3ebaf1badacffa0899f1a9f247e03085b600b54afb6f559eab9b4e5ffd834e6a2fa9557c302e568f0afc5a620c47fa8753a9280bd216e9a27c0fcb267e1f4ccd58333de586ef8da9a1d86675cca36d6d51f266d0a689258c0771dea32489897129fd2750e428b0ba65c6c1965bb07ef210a5f1f3b1b6efbf4f67f5bbb4cbad454367b2eabaf221b682ff004854ff06394ee9a2aefe1c1f59eea605dfb5a5efc85c37bb89e6e442201bb30a88395b30b7f1b8763888fdebe08f378ed571fa8c9e47e65ba458d2b34c0e4d8350f9e047a73203b38f88a850d6589f58fd245a52c82b034c7b54512dc73e81db50d851598bd7f3b85a31e2e93832d437b4203c1b0698e8285960d4792f312c5b16a67d12623c47e5834604b55aa56159c6adec6a83270036ed375685667e26f15863c19ba5628197291c75f987607b93653ca3e4e59cfc30f4974fdd5d8373fd4d3c68522e0d4793c8fee4a81461b4063dd8580e1c334a3efaeee6f34a527cbdabb7e7eda1fca60119e0f0b392832292ad0f0dd90b9b15bd97fbcf69ba5dda45b626a4d34d813a4976fbe7ac7936b97516c3b3da3e03058c332426dba8e5f6658e99d0e8165ed4f6a462696b9ed8fc484b257ca3f61df68155b6616e7f15aa1c48274331b1c96750ef6a55058dc8ca053abcdb70676711630fbc19be601c3347e944950f3edc7d3deeaffb9649164e9366d0b604c804e56c99804c13935f8cc800ccf0ee3abf3ccbb09dfbeffba4f9d478fcfc66b951c50e05293413410defe8be69750d9865f12b2534ee0412022077f6a0ed18f19bab5a8e037e21f4391a869fc825a766bf2a4db7a7f5633506ff76ccb1e10780e8ff026e98f8ed42061ba64e1e18ddc42cf8852a5a34859ee5a0ccbb2ef6421d4b42123148477fbe9eed949ee4f9852cb4c3218faee561e5ca18f0c3d573622b80cf1fd06679914e51ad2f31ca21113c2079e632cc59b2e32ab4998a18135202038635eacd1313c1659a82a3fb947eb49c1ffa431c9610bde70b65d103d48875297c520bd19c0b987cc9126a29b304cf5109c0611bcb73ad161212fd9f246d6b76980714c2f21bb1fc10c6ccc2116e06707b2df5876c2ca2dade6239fb599f36111ae124935147ee49384ace69449398cd155486bd8a0a7bd066ed1d18bc4d28abb26c8f8662b532a3dd7140480a78f0f543f59c60fca654d860dea6cbd33c304ee783be9c2114a46152061d39d45333d8de7258634e4392a36fe2442a789bf4c463d5cc80efab03b5d709308cba9ba49ed27b2ea731ded03a3242c132c9ef2228e5c7b8cf8c32e559b7663d2c27a16f7314880eb50e8e030257db0799d84d44766f64c519bf94055fd8504161f5b54ea8049016db80b5a6f3f83781a1d4a009da59b7f60276507e983cc18c75e72219bf62f34df37e054241f1efd61e03f117c4ed4ce497f77459938ba0acde774abc306d3c697e3e90e4ae446bec4966178bfd01d0d466f5eb324cf726897d3d0b589d71fa5b7998df00b84e6307a9e9bc0aba201510907bea26af185031b227eb2995d9a11c7b1cabcb71374451f65cc27dd651ed85e8849005e190619b97ba1dfb6d1a9811aa7c2cc99e35db0309a09da508d6d3ab8c868f51728c2e4bc9281101f5ff891aba84f1bd243dcdaa2da5bc374ff9608e9cc93607fab0c21af6da309e5c66ad6fbe32c149e4c074181e23b88a5e75831107a240941ea895e910679c7a3d0b89bf09af4e79b62c838f47b4130090ca45d86e5b3f448488872c8b370154dcfbe956db746c2a9798f0970fe812a2d8cf3359c784cc66ef7133aa072f301181bb10093e4aea9f0e3d15b8c020795e426647f98c920ff67f20e85780b82ab39bf744ed7a77b3d24db2c83a6e05b224c4ff7dcbf785214bd9cab89ccaaea90d147a9130ec04190048c205ef561f8351b19cee641e86cea7ec47f40673545342f8f45774f205276ae443da6ce526e02f065e3f2b62f26a65f1e9043447ad495aca5d6d912596f26fb86fa936f81650bcc4627f0f8d6fc7959aa57e05a49696b18b4595c17b431e1e78c9679dee330a8f75d0254980c2d7229bfaddbdfc71678158d0cde66f5b34e3f3f0fcc061bc6c60ee12c81a9eb4a30450bf6d1049d358a1d31be8ed1a3d3b7976c759b9f66a592a4a94b4b8e31e59b5d1fdc62cbea15795c760ddf8685597cebeba78cd724473b680e68039b8d2504a776e8e87be757f2162e28d237a3238f3feb6b29a3c30c2050d43ed4763daf65c1f1f4f4e11801f6197c84d6149fcd7734dc990c6a0bbb67dfa516f2928505dac8be97ee46690cbc3ceee066c92af6b7cfc48244d7c8ae05044c9d8be7add4764620add57a9f08f8da100b9a8c441f312b464e0ae1df3b7f38adf6dfe0d1fbda17808915b6ed33fe696658eea2c393b38dcdf07745267147d1368cb7e461b590fbeda550f47fc3e779a1df1cfc5ad8c756876fde75e8a2660683c7c5a7cfeacb770124cc5f882be5250673d829f9061d7321e598ab6061aa8ab439a85b64045263a48d240942708b590f7f472eba4584e765615e440672bb61b4a71d5aaa8f9b67754a399251eceb0b21aa599e9075c06670aedc63bc1760feba8caeb7eb976bd7c75d34dd13d859ef0e6aac8bbcff58df51fa64f263432f830db2204f61663b6e4717397f5d0cd48290a6aad7412ef6be991a23f04efef1e2a06e782fe9295ea9de4afb4f5973e8c4789a753362ebf95272a353b5d5c25447d1edca13de58ddcdd6d01ab5cc700cc7e1c0049f2161006638df7f76af234e17384c99d70fae11770c0e57ad8b5ba0d716aedbd737d764d4389474a36382b34d5c94954b220038e5e6cab4594a7d4e0bdc5dda1e17f5e5527195934dc494f82c4df76bae25735fc7cb023fe214cb795ee310515d8d46ebdef91d6c0839eb67e95b6318535c2d6f43954140255a7f88486e930e120ef9", 0x1000}], 0x5, &(0x7f00000041c0)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x16}}}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x10000}}, @hopopts_2292={{0x40, 0x29, 0x36, {0x87, 0x4, '\x00', [@enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0x9}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}, @dstopts_2292={{0x58, 0x29, 0x4, {0xc, 0x7, '\x00', [@hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast2}}, @hao={0xc9, 0x10, @loopback}, @enc_lim, @jumbo={0xc2, 0x4, 0x8}, @hao={0xc9, 0x10, @remote}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xc3b}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}], 0x130}}], 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x128) pipe2(&(0x7f0000004400)={0xffffffffffffffff}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000004440)={{0x1, 0x1, 0x18, r0, {0x3505c055dcc4ac1e}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000004480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) 23:04:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x112, 0x2, 0x6, "931f58d83b19a80c3f5813e96b5a9127", "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"}, 0x112, 0x3) 23:04:23 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x0) 23:04:23 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000180), 0x0) r1 = eventfd2(0x534a, 0x800) fcntl$setpipe(r1, 0x407, 0x80000001) 23:04:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:04:23 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 17) [ 2425.386960] FAULT_INJECTION: forcing a failure. [ 2425.386960] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.389377] CPU: 0 PID: 11787 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2425.390840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2425.392579] Call Trace: [ 2425.393138] dump_stack+0x107/0x167 [ 2425.393912] should_fail.cold+0x5/0xa [ 2425.394717] ? create_object.isra.0+0x3a/0xa20 [ 2425.395683] should_failslab+0x5/0x20 [ 2425.396487] kmem_cache_alloc+0x5b/0x310 [ 2425.397344] create_object.isra.0+0x3a/0xa20 [ 2425.398273] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2425.399349] __kmalloc_track_caller+0x177/0x370 [ 2425.400325] ? v9fs_session_init+0xa7/0x1680 [ 2425.401250] ? kernel_text_address+0xf2/0x120 [ 2425.402209] kstrdup+0x36/0x70 [ 2425.402885] v9fs_session_init+0xa7/0x1680 [ 2425.403784] ? lock_release+0x680/0x680 [ 2425.404619] ? find_held_lock+0x2c/0x110 [ 2425.405482] ? kmem_cache_alloc_trace+0x151/0x320 [ 2425.406502] ? v9fs_show_options+0x690/0x690 23:04:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = syz_open_dev$rtc(&(0x7f0000000000), 0x1a60155c, 0x8001) lseek(r2, 0x99bf, 0x3) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2425.407442] ? trace_hardirqs_on+0x5b/0x180 [ 2425.408442] ? kasan_unpoison_shadow+0x33/0x50 [ 2425.409403] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2425.410493] v9fs_mount+0x79/0x8f0 [ 2425.411244] ? v9fs_write_inode+0x60/0x60 [ 2425.412125] legacy_get_tree+0x105/0x220 [ 2425.412979] vfs_get_tree+0x8e/0x300 [ 2425.413756] path_mount+0x1429/0x2120 [ 2425.414561] ? strncpy_from_user+0x9e/0x470 [ 2425.415466] ? finish_automount+0xa90/0xa90 [ 2425.416440] ? getname_flags.part.0+0x1dd/0x4f0 [ 2425.417428] ? _copy_from_user+0xfb/0x1b0 [ 2425.418321] __x64_sys_mount+0x282/0x300 [ 2425.419175] ? copy_mnt_ns+0xa00/0xa00 [ 2425.420002] do_syscall_64+0x33/0x40 [ 2425.420783] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2425.421866] RIP: 0033:0x7ff784b43b19 [ 2425.422681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2425.426575] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2425.428173] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2425.429670] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2425.431172] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2425.432667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2425.434178] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:04:23 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 2425.508798] loop3: detected capacity change from 0 to 135266304 [ 2425.520583] tmpfs: Bad value for 'mpol' 23:04:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10100, 0x83) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:04:23 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) syz_io_uring_setup(0x19f9, &(0x7f0000000200)={0x0, 0x50ba, 0x1, 0x2, 0x398}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000002c0)=0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000300)=@IORING_OP_WRITE_FIXED={0x5, 0x5, 0x2004, @fd=r3, 0x1f, 0x401, 0x2, 0xa, 0x1, {0x3, r4}}, 0x8000) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r5, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000063ee051a9f00000000000800000000000000", @ANYRES32=r7], 0x38}}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@loopback, 0xf, r7}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r8, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}}) openat(r8, &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x80) 23:04:23 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x34000) 23:04:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:04:23 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 23:04:24 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x80000) [ 2425.802649] loop3: detected capacity change from 0 to 135266304 [ 2425.824578] tmpfs: Bad value for 'mpol' 23:04:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x109) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x401}}, './file0\x00'}) chdir(0x0) 23:04:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:04:39 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 23:04:39 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x0, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:04:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x2, &(0x7f00000008c0)=[{&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:04:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 18) 23:04:39 executing program 2: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x2) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:04:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x400300) [ 2440.997640] FAULT_INJECTION: forcing a failure. [ 2440.997640] name failslab, interval 1, probability 0, space 0, times 0 [ 2441.000694] CPU: 0 PID: 11843 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2441.002485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2441.004658] Call Trace: [ 2441.005532] dump_stack+0x107/0x167 [ 2441.006498] should_fail.cold+0x5/0xa [ 2441.007491] should_failslab+0x5/0x20 [ 2441.008490] __kmalloc_track_caller+0x79/0x370 [ 2441.009671] ? v9fs_session_init+0xe9/0x1680 [ 2441.010836] ? kernel_text_address+0xf2/0x120 [ 2441.012012] kstrdup+0x36/0x70 [ 2441.012861] v9fs_session_init+0xe9/0x1680 [ 2441.013960] ? lock_release+0x680/0x680 [ 2441.014349] loop3: detected capacity change from 0 to 135266304 [ 2441.015012] ? find_held_lock+0x2c/0x110 [ 2441.016726] ? kmem_cache_alloc_trace+0x151/0x320 [ 2441.017976] ? v9fs_show_options+0x690/0x690 [ 2441.019138] ? trace_hardirqs_on+0x5b/0x180 [ 2441.020253] ? kasan_unpoison_shadow+0x33/0x50 [ 2441.021431] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2441.022823] v9fs_mount+0x79/0x8f0 [ 2441.023707] ? v9fs_write_inode+0x60/0x60 [ 2441.024736] legacy_get_tree+0x105/0x220 [ 2441.024761] tmpfs: Bad value for 'mpol' [ 2441.025737] vfs_get_tree+0x8e/0x300 [ 2441.025757] path_mount+0x1429/0x2120 [ 2441.025782] ? strncpy_from_user+0x9e/0x470 [ 2441.025803] ? finish_automount+0xa90/0xa90 [ 2441.029822] ? getname_flags.part.0+0x1dd/0x4f0 [ 2441.030805] ? _copy_from_user+0xfb/0x1b0 [ 2441.031680] __x64_sys_mount+0x282/0x300 [ 2441.032534] ? copy_mnt_ns+0xa00/0xa00 [ 2441.033358] do_syscall_64+0x33/0x40 [ 2441.034140] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2441.035230] RIP: 0033:0x7ff784b43b19 [ 2441.036007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2441.039894] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2441.041490] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2441.042988] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2441.044470] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2441.045960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2441.047453] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:04:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf0ffff) 23:04:39 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) 23:04:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0xfc, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) openat(r1, &(0x7f0000000140)='./file0\x00', 0x4c8000, 0xb1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x28) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xc6, 0x1, 0x5, 0x2, 0x0, 0x3, 0x2, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x8259, 0x92, 0x1, 0x6, 0x3, 0x3ff, 0x1f, 0x0, 0x80, 0x0, 0xb18b}, 0x0, 0x0, r2, 0x8) 23:04:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{0x0, 0x0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:04:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x1000000) 23:04:39 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(r0, 0x5, &(0x7f0000000000)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fed000/0x13000)=nil], 0x0, &(0x7f0000000040)=[0x0, 0x0], 0x2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:04:39 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) 23:04:39 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) 23:04:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x2000000) [ 2441.253427] loop3: detected capacity change from 0 to 135266304 [ 2441.255844] tmpfs: Bad value for 'mpol' 23:04:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x11490, 0x100, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x4000) flock(r1, 0x6) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) r2 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x2, &(0x7f0000000100)=[{&(0x7f00000000c0)="ac2045c7f9becf15cffb13850a79b6678af6b52f723e879df1a4cca955b4a699f1255368057012b16d639e3d60066b0082", 0x31, 0x2}, {&(0x7f0000000380)="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", 0x1000, 0x3}], 0x80, &(0x7f0000000140)={[{@utf8}, {@dmode={'dmode', 0x3d, 0x3a}}, {@gid={'gid', 0x3d, 0xee01}}, {@map_normal}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}], [{@subj_user={'subj_user', 0x3d, '(/!\\:$([&3'}}, {@seclabel}, {@audit}, {@smackfstransmute={'smackfstransmute', 0x3d, ']!+@\'#--$},@$^)'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@permit_directio}]}) openat(r2, &(0x7f0000000240)='./file0\x00', 0x2, 0x80) [ 2458.519371] loop4: detected capacity change from 0 to 4096 23:04:56 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x0, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:04:56 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[], 0x1c}}, 0x0) 23:04:56 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x3000000) 23:04:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 19) 23:04:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{0x0, 0x0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:04:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:04:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) [ 2458.525286] FAULT_INJECTION: forcing a failure. [ 2458.525286] name failslab, interval 1, probability 0, space 0, times 0 [ 2458.527802] CPU: 1 PID: 11893 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2458.529264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2458.531022] Call Trace: [ 2458.531550] dump_stack+0x107/0x167 [ 2458.532274] should_fail.cold+0x5/0xa [ 2458.533087] ? create_object.isra.0+0x3a/0xa20 [ 2458.534055] should_failslab+0x5/0x20 [ 2458.534856] kmem_cache_alloc+0x5b/0x310 [ 2458.535728] create_object.isra.0+0x3a/0xa20 [ 2458.536651] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2458.537724] __kmalloc_track_caller+0x177/0x370 [ 2458.538705] ? v9fs_session_init+0xe9/0x1680 [ 2458.539641] ? kernel_text_address+0xf2/0x120 [ 2458.540591] kstrdup+0x36/0x70 [ 2458.541270] v9fs_session_init+0xe9/0x1680 [ 2458.542162] ? lock_release+0x680/0x680 [ 2458.543008] ? find_held_lock+0x2c/0x110 [ 2458.543930] ? kmem_cache_alloc_trace+0x151/0x320 [ 2458.544945] ? v9fs_show_options+0x690/0x690 [ 2458.545899] ? trace_hardirqs_on+0x5b/0x180 [ 2458.546817] ? kasan_unpoison_shadow+0x33/0x50 [ 2458.547792] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2458.548863] v9fs_mount+0x79/0x8f0 [ 2458.549644] ? v9fs_write_inode+0x60/0x60 [ 2458.550531] legacy_get_tree+0x105/0x220 [ 2458.551409] vfs_get_tree+0x8e/0x300 [ 2458.552193] path_mount+0x1429/0x2120 [ 2458.553032] ? strncpy_from_user+0x9e/0x470 [ 2458.553964] ? finish_automount+0xa90/0xa90 [ 2458.554936] ? getname_flags.part.0+0x1dd/0x4f0 [ 2458.555937] ? _copy_from_user+0xfb/0x1b0 [ 2458.556822] __x64_sys_mount+0x282/0x300 [ 2458.557720] ? copy_mnt_ns+0xa00/0xa00 [ 2458.558559] do_syscall_64+0x33/0x40 [ 2458.559376] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2458.560454] RIP: 0033:0x7ff784b43b19 [ 2458.561240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2458.565181] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2458.566812] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2458.568347] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2458.569849] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2458.571394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2458.572896] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2458.637647] loop4: detected capacity change from 0 to 4096 [ 2458.669662] loop3: detected capacity change from 0 to 135266304 23:04:56 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x20, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x8, 0x43}}}}}, 0x20}, 0x1, 0x0, 0x0, 0xc0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:04:56 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[], 0x1c}}, 0x0) [ 2458.699329] tmpfs: Bad value for 'mpol' 23:04:57 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x9000000) 23:04:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 20) 23:04:57 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) pwrite64(r3, &(0x7f00000003c0)="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", 0xff, 0x1) openat(r2, &(0x7f0000000080)='./file0\x00', 0x600c0, 0x100) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x6, 0xfc, 0x1f, 0x35, 0x0, 0x7, 0x91, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x1, 0x9}, 0xa200, 0x3, 0x80, 0x8, 0x4, 0x8000, 0xfe01, 0x0, 0xcb, 0x0, 0x4}, 0xffffffffffffffff, 0x1, r0, 0x8) 23:04:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9613, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000380)="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", 0x1000, 0x100000000}, {&(0x7f00000000c0)="337fb88f38143f0b40607882856ea7e28dd7bc8d0683fcb814b98da3786d3d62ac19540c4e6b0ffc4ab12ba08083a5ce5f6339417e440a923dce13c61da322574cc19feb07a7a861ddb9215c4eedadc1d917c7414af9bd0477249a1a5ac65469f0ec717ba242038c1a5ccb2f442b3114325d1d5149f6305b4fc76543d326da424a3ce86f5fd0", 0x86, 0x1f}, {&(0x7f0000000180)="2126f29665d46d9b5ce1b4f4c4192a20d2a60cab844a213ff9f8164031d6c6a27eea8d94de168b285c1f07ece7d528f796f3d5598d0cf66e6a7fd50df73d563e3bf8912808772531b3ae3e2095fe69457f39949cbf37ac557a2bae3027d11a0cf4b92f8e1ce083b0919b408588460d88de65b313fc8e6fa67a128c29a4f0d6ddd7a7d8c806f7b64199e7c4b743f460f7932a5afec46247dc41323a4d09871442723aa1886077fee3b991cb356842f8004681183de805f0f6ff8f87d3", 0xbc, 0x7}, {&(0x7f0000000240)="e8ec4c17d2ab71b0e34961d0f7245c9f7a28b051808dc96c1be42a08f3e66d4ebb59036e083585d3188cc3e0ebf02f5a698c989f1249eef374cacb1cebbe1c0a7b95503070d0d456cd7d1ee210644cef26daabd189685c60188e8e2ae2863f4dd4f2", 0x62, 0x9}], 0x1000800, &(0x7f0000001380)={[{@huge_advise}, {@huge_never}, {@mode={'mode', 0x3d, 0x100000001}}, {@gid}, {@nr_blocks={'nr_blocks', 0x3d, [0x39, 0x39, 0x67, 0x37]}}, {@mpol={'mpol', 0x3d, {'interleave', '=relative', @val={0x3a, [0x33, 0x36, 0x3a, 0x33]}}}}], [{@obj_role={'obj_role', 0x3d, '!{$]#}'}}, {@smackfshat={'smackfshat', 0x3d, '^*'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ','}}]}) 23:04:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{0x0, 0x0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2458.889339] FAULT_INJECTION: forcing a failure. [ 2458.889339] name failslab, interval 1, probability 0, space 0, times 0 [ 2458.891796] CPU: 1 PID: 11920 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2458.893600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2458.895394] Call Trace: [ 2458.895963] dump_stack+0x107/0x167 [ 2458.896743] should_fail.cold+0x5/0xa [ 2458.897563] ? p9_client_create+0xaf/0x1230 [ 2458.898493] should_failslab+0x5/0x20 [ 2458.899320] kmem_cache_alloc_trace+0x55/0x320 [ 2458.900299] ? find_held_lock+0x2c/0x110 [ 2458.901174] p9_client_create+0xaf/0x1230 [ 2458.902070] ? lock_downgrade+0x6d0/0x6d0 [ 2458.902986] ? p9_client_flush+0x430/0x430 [ 2458.903893] ? trace_hardirqs_on+0x5b/0x180 [ 2458.904821] ? lockdep_init_map_type+0x2c7/0x780 [ 2458.905841] ? __raw_spin_lock_init+0x36/0x110 [ 2458.906826] v9fs_session_init+0x1dd/0x1680 [ 2458.907767] ? lock_release+0x680/0x680 [ 2458.908629] ? kmem_cache_alloc_trace+0x151/0x320 [ 2458.909663] ? v9fs_show_options+0x690/0x690 [ 2458.910616] ? trace_hardirqs_on+0x5b/0x180 [ 2458.911529] ? kasan_unpoison_shadow+0x33/0x50 [ 2458.912506] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2458.913572] v9fs_mount+0x79/0x8f0 [ 2458.914337] ? v9fs_write_inode+0x60/0x60 [ 2458.915239] legacy_get_tree+0x105/0x220 [ 2458.916109] vfs_get_tree+0x8e/0x300 [ 2458.916887] path_mount+0x1429/0x2120 [ 2458.917779] ? strncpy_from_user+0x9e/0x470 [ 2458.918685] ? finish_automount+0xa90/0xa90 [ 2458.919643] ? getname_flags.part.0+0x1dd/0x4f0 [ 2458.920626] ? _copy_from_user+0xfb/0x1b0 [ 2458.921517] __x64_sys_mount+0x282/0x300 [ 2458.922381] ? copy_mnt_ns+0xa00/0xa00 [ 2458.923229] do_syscall_64+0x33/0x40 [ 2458.924025] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2458.925119] RIP: 0033:0x7ff784b43b19 [ 2458.925911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2458.929860] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2458.931500] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2458.933030] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2458.934558] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2458.936073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2458.937600] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2459.018416] loop4: detected capacity change from 0 to 135266304 [ 2459.020965] tmpfs: Unsupported parameter 'huge' [ 2459.034046] loop3: detected capacity change from 0 to 135266304 [ 2459.045824] tmpfs: Bad value for 'mpol' [ 2459.058464] loop4: detected capacity change from 0 to 135266304 [ 2459.060233] tmpfs: Unsupported parameter 'huge' 23:05:16 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x0, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:05:16 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[], 0x1c}}, 0x0) 23:05:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 21) 23:05:16 executing program 0: syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000380)={0x2c, &(0x7f0000000000)={0x0, 0xd, 0x90, {0x90, 0x21, "d70f20478daf096ec261509fb34b2e89c1f857f23f21b9d33e85b644aaffed477df75a180ce819b8e2880e0a43559e50ca306dcbfb03667e3a2b52c8f2df6869b7884c6ea9f548bf4150e983a778aa4aa8c76f1b451508a2be50525ee6ad7c1241103a89d0f51f4f7acecb2ab65d1fd80cf04d9a1daf2ea246d7f456ce94be608e8d930b35f82277612d69afee48"}}, &(0x7f00000000c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x814}}, &(0x7f0000000100)={0x0, 0xf, 0x1c7, {0x5, 0xf, 0x1c7, 0x6, [@generic={0xaa, 0x10, 0x4, "5ca90941e16f80b896a11f917d8c60a4d478b3790da1a702fa82df82f73fdcd8939e145f4fd9bb06f28a2c20ab0d09ea32f0005326862ed1f5f3313be2b19908ed01baa2b4fdf7bdabeccc00e334a35c92007dcec0b02321bcac17da5068522f24ed049dd5ba3bfae3bc9f374652274bf0bda9395df9b0563b2c9a9cca6f36b030acef6f00e5e02160b46fc3e8060188c0dc2d6ba96dae5cdd2139e2119dc3d99ecc3732bd042a"}, @ssp_cap={0xc, 0x10, 0xa, 0x20, 0x0, 0x9, 0xf, 0x8}, @generic={0x58, 0x10, 0xb, "de5e6874de2d6cf04b3997b7ceb5fbf5a2966661a45bf84b86f7a084d3be6775908e90a172ea9efe135bba27216702ef80cb73f19a531925409b4193af7d21baf264ba4d9994d94be8eceb4e9d092726a3180a7392"}, @ssp_cap={0x14, 0x10, 0xa, 0x4, 0x2, 0x8001, 0xf0f, 0x79, [0x3f3f, 0xc030]}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "c721f0063a8f938dcb93697e587346c1"}, @generic={0x8c, 0x10, 0xa, "0847e85dc064a0cad91087e0e3b03c71dede5ab1209372985c66b0fb9748c7241e7872a60d75bb2ff6d2aa372aa4cfa8f65e92c113cbbdb2f5cb400397398e0976318dd8be2d4c5efc76f43d78fe54b23382e4e71e8b1cbfff183cb264e3b09b4b27de34c61013018baf1f432d6a028edc96f14e032b337093f50edb9d3d67f0f3c423deaab3709875"}]}}, &(0x7f0000000300)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1, 0x3, 0x1, 0x6, "329669fe", "b0f79838"}}, &(0x7f0000000340)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x8, 0x0, 0x0, 0xf7, 0x9, 0x3, 0x101}}}, &(0x7f0000000840)={0x84, &(0x7f00000003c0)={0x40, 0x3, 0xb6, "9aa0faf10c60cf3724a8e21b07fc54a2a9b30000e31d4a202f57ebdbb3c2a4d08931ce6f665e317ddda74d02c8cc6ad0b3890645303a37e8b0e7ebcf9cce03b91bc561d579ccdf1553d5916a5607537dfc7a7d6b80b178ef75ce25de50b37ec2117a0d22d81b4b965ee986f8add887df3add8bb65566ee36111c26fcb437a38ed9436e8b63642ed3561e71fce060ccab754deab2230b040ca06f7dc15e69d059263e08c6677a622881c1305dce1dd95b0ebb23f65bf4"}, &(0x7f0000000480)={0x0, 0xa, 0x1, 0x8}, &(0x7f00000004c0)={0x0, 0x8, 0x1}, &(0x7f0000000500)={0x20, 0x0, 0x4, {0x2, 0x3}}, &(0x7f0000000540)={0x20, 0x0, 0x4, {0x1e0, 0x40}}, &(0x7f0000000580)={0x40, 0x7, 0x2}, &(0x7f00000005c0)={0x40, 0x9, 0x1, 0x1e}, &(0x7f0000000600)={0x40, 0xb, 0x2, "7fde"}, &(0x7f0000000640)={0x40, 0xf, 0x2, 0xfff9}, &(0x7f0000000680)={0x40, 0x13, 0x6}, &(0x7f00000006c0)={0x40, 0x17, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, &(0x7f0000000700)={0x40, 0x19, 0x2, "fed8"}, &(0x7f0000000740)={0x40, 0x1a, 0x2, 0x8}, &(0x7f0000000780)={0x40, 0x1c, 0x1}, &(0x7f00000007c0)={0x40, 0x1e, 0x1}, &(0x7f0000000800)={0x40, 0x21, 0x1, 0x7}}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:05:16 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf000000) 23:05:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000100)={0x0, "126be0cf9b1e650a3ee975bf6521fcdba9f7dddf0fb3bf63a469d47bbb2eab5d8cb63cb7d0e0f2945f220eaaf4419b4137e317cfefeb8ced2c466c3545661eaf"}, 0x48, 0xfffffffffffffffc) keyctl$clear(0x7, r2) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x802000, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d6016a446c5a1fefba167c3b2e7903e9746105d9c199b656a480241b28479b6819372de32c348b7fbcc16860a61a11e561e3d2e72f7c45c2bedb8eb283bd22e0da2d34d68ad816c6bfdcdb925fab8bc0028aaab015bff4984aec74838c29d3116f51644448f2a725bcd97f0f0e4b8b0a0b6b3804eeac1408c4244afae4d4a9a98be54446cd1eca6706336f35104a71d6d15dfd03185fe2f6f1dc42f09da2edfb4394be3b361426e96ad80f27201ad78008fb93ba7f254", @ANYRESHEX=r0, @ANYBLOB="2cf10d69af6f3d", @ANYRESOCT=r1, @ANYBLOB="c800"]) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:05:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500), 0x0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:05:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000c40)=""/105) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x3a4, 0x33, 0x400, 0x70bd27, 0x25dfdbfb, {0xd}, [@generic="87cd8ab9b63cc2388d3a07cd4193230df2c71ec3d849bdceffb57923f33f7bec8aae25795393fd88d50485d323ceed367820f59a4485d8dec2cd3c13b1dc55230d254a0642f145181222275967596767f2", @typed={0xc0, 0x59, 0x0, 0x0, @binary="dfb73ef52d59b6796e396b5cb411abe485020b50a904c5f39e0e03fdea403fd23e2ebe317ca6319eb191e8d7412409d7c32c28c9af9cdcdffadd8fc887ee3ccf946096a794daa5418922d308a8ccfc1e1c19b6920faf30649151a1d8c7a2c1d8ecca29950057479968a8429a0fa403fd6d4014ec62f10088f63de1c254f69f6ca7dba67b48c900212e0acde43c3a7715cbc3018eda779225d4210f055692e4f69338adee59f5cb46e5ae8948a7271e0c766173349731d7a9dd176e09"}, @generic="b137d44e5e10ad3bbf34260be4315d03d13b24bb9d9e6fe11523885b8d7221154ba2", @typed={0x8, 0x55, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="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", @generic="7e750dd74f331658a02d27de9e1ecbccf159db6814d5d1d37281eecd345f961714697dc02f710bfd46ecd3748e191ae4f3c1a07b4d4b5f905cb6e8a32d3a11a378ebf3db033b18476f60b457b0a583dcd2b743a73f81db7e10ad85e5e3116b09537e837b65ae555b5629fb38bfda64c4305278ee", @generic="b743d952dd1c7fa745e0f6796478e59e5165f3657360ebf2c6fa741958a0a9b87bc7e8f6443f707d09b9d15713e3c1ea8b2a53e5504179ac4bae3d4140f6e21b6e8a5d4d6395ba55f87f97b0dabba6f3aa2add307e01fa27ddf21f55d47e2f31d80aa229bc1140cd8083d6365048c05eccc9ef19a708adfe9c7e89de709acdcf3015fc5325da7df0fd820e3302e1dc781ceb9cef275eccf6c380f5d7800ce764ed017e4495e8b4c02ffa4b7c8d9fe92330e41fbdad025b6a7b49726d4efb532da89bb6cee8971675a75614d7eb1eb79986f459a361fdec0fa25cffb45967a32509"]}, 0x3a4}, 0x1, 0x0, 0x0, 0x40000}, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000bc0)={0x1, 0x80, 0x85, 0x20, 0xff, 0x3, 0x0, 0x3, 0x1203c, 0x10, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6b689a24, 0x1, @perf_config_ext={0x4, 0x2}, 0x8, 0x4f2, 0x211, 0x5, 0xfffffffffffffffe, 0x1, 0x5, 0x0, 0x9ef, 0x0, 0x7f}, r2, 0x5, r0, 0xb87a3d1f8a46c727) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e756c6c6c510e"], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ceph\x00', 0x40, &(0x7f0000000100)='+\'\'!-\f$\xb2\\*&\x0f\x00') getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) r3 = syz_mount_image$ext4(&(0x7f00000002c0)='ext2\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffffffc, 0x3, &(0x7f0000000900)=[{&(0x7f0000000740)="c7c43f85184de47c97f7aa99de07e8035983c9e7e3dbce13f5244ab9d37b7496696333a4ec5d0648", 0x28, 0x80000000}, {&(0x7f0000000780)="012d0aa332940cef7f92ee97cbd3a605d5d116b4c72d1506d4f1bc73b40399df6f39484ec5c1f461b37f375bd459654bdb70c541b17529182d76c958502ed6667135af24fdd5aee837e58b48ecb6", 0x4e}, {&(0x7f0000000800)="e3ecf16afe447b69dbc4771675911ffd35d64a5c07ac514adf72f81539b96cd6e2a6e514829f69ec4e879f8f0ab1f1030f2c893e29b16b12a95e0a66adbd572edb93f055ac96e00d17f1e19c5355e1363c506b88545fa081f6be0884a781be9fd29028131537b159fd459060966cf2dfd8f05a10697e73c3f346a829c340ef4dbd10107fed78b9caf8aa1a8f27520eb117be36b966ec09ac88ec8ae5bdd91ca6237ec3ef07ca32803ac428ac667efa8166cdc64df7e0755c04eac93a4eca10addecbedc76b4c32adf3c4f2aae1d8bd7c0624ec10ae32ce15e5be9944bf4ed72454905ca8c6a2fb43eca319", 0xeb, 0xfffffffffffffffb}], 0x100010, &(0x7f0000000980)={[{@nolazytime}], [{@euid_gt={'euid>', 0xee00}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, 'ceph\x00'}}, {@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfshat={'smackfshat', 0x3d, '+\'\'!-\f$\xb2\\*&\x0f\x00'}}, {@uid_lt={'uid<', 0xee00}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fsname={'fsname', 0x3d, '+\'\'!-\f$\xb2\\*&\x0f\x00'}}]}) execveat(r3, &(0x7f0000000a40)='./file0\x00', &(0x7f0000000b00)=[&(0x7f0000000a80)='+\'\'!-\f$\xb2\\*&\x0f\x00', &(0x7f0000000ac0)='+\xef:^\x00'], &(0x7f0000000b80), 0x1000) [ 2478.374298] FAULT_INJECTION: forcing a failure. [ 2478.374298] name failslab, interval 1, probability 0, space 0, times 0 [ 2478.377180] CPU: 1 PID: 11940 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2478.378948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2478.381053] Call Trace: [ 2478.381718] dump_stack+0x107/0x167 [ 2478.382787] should_fail.cold+0x5/0xa [ 2478.383975] ? create_object.isra.0+0x3a/0xa20 [ 2478.385204] should_failslab+0x5/0x20 [ 2478.386150] kmem_cache_alloc+0x5b/0x310 [ 2478.387184] ? kernel_text_address+0xf2/0x120 [ 2478.388341] create_object.isra.0+0x3a/0xa20 [ 2478.389422] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2478.390902] kmem_cache_alloc_trace+0x151/0x320 [ 2478.392266] ? find_held_lock+0x2c/0x110 [ 2478.393302] p9_client_create+0xaf/0x1230 [ 2478.394342] ? lock_downgrade+0x6d0/0x6d0 [ 2478.395394] ? p9_client_flush+0x430/0x430 [ 2478.396470] ? trace_hardirqs_on+0x5b/0x180 [ 2478.397564] ? lockdep_init_map_type+0x2c7/0x780 [ 2478.398760] ? __raw_spin_lock_init+0x36/0x110 [ 2478.399927] v9fs_session_init+0x1dd/0x1680 [ 2478.401008] ? lock_release+0x680/0x680 [ 2478.402032] ? kmem_cache_alloc_trace+0x151/0x320 [ 2478.403228] ? v9fs_show_options+0x690/0x690 [ 2478.404371] ? trace_hardirqs_on+0x5b/0x180 [ 2478.405440] ? kasan_unpoison_shadow+0x33/0x50 [ 2478.406666] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2478.407966] v9fs_mount+0x79/0x8f0 [ 2478.408879] ? v9fs_write_inode+0x60/0x60 [ 2478.409937] legacy_get_tree+0x105/0x220 [ 2478.410980] vfs_get_tree+0x8e/0x300 [ 2478.411941] path_mount+0x1429/0x2120 [ 2478.413002] ? strncpy_from_user+0x9e/0x470 [ 2478.414096] ? finish_automount+0xa90/0xa90 [ 2478.415486] ? getname_flags.part.0+0x1dd/0x4f0 23:05:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getuid() [ 2478.416988] ? _copy_from_user+0xfb/0x1b0 [ 2478.418254] __x64_sys_mount+0x282/0x300 [ 2478.419275] ? copy_mnt_ns+0xa00/0xa00 syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f00000002c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x7}, {&(0x7f00000013c0)="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", 0x1000, 0xfffffffffffff77f}, {&(0x7f0000000100)="2f1dedd54db28f8655efc361913b3e4efdff4a0a712bf5ef7b3c407613e509ef0b374179bec2904ec5b27745285611a611656e37054e239ab0db273eacaef67b48f5766cc46609cb9f50f83c34c1eafff70ea408674393781d5354a415b5ecdcd79406fd73", 0x65, 0xffff}, {&(0x7f0000000200)="ce695e20b518ed8708dedd305818998e697cb0b356421078419c7d3cc39690b25138dd45c21a15dc221caef46290d7c83d", 0x31, 0x8}, {&(0x7f00000023c0)="272cda87263221013a9804fa30e4c234faa0e49f1e033ba4929089f8e974b1bdea3750c68023c6d4abd8bd4abdcaadbb9f325afbcafbd940c2c14949f72dbbe04f148c52d412bb7bf551517cb4292d93c463cf4d20579eb243261f2e546d9a0e671252c1226c2c0962c48df50b38dc77fdedf4091fed976d0751f52efc7393e66f1cc89a24518fb772a84b1f109452a50edb8348cdc4fe1c788cceb1084573fbf7", 0xa1, 0x7}], 0x100010, &(0x7f0000002480)={[{@jqfmt_vfsv1}, {@acl}, {@minixdf}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@hash}, {@fsname={'fsname', 0x3d, '\\[&-'}}, {@appraise}, {@euid_gt={'euid>', r0}}, {@audit}, {@uid_eq}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2478.420302] do_syscall_64+0x33/0x40 [ 2478.421382] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2478.422684] RIP: 0033:0x7ff784b43b19 [ 2478.423634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2478.428293] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2478.430190] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2478.432123] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2478.433642] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2478.435143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2478.436664] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2478.441573] loop4: detected capacity change from 0 to 135266304 23:05:16 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1c}}, 0x0) [ 2478.527786] loop3: detected capacity change from 0 to 135266304 [ 2478.553700] tmpfs: Bad value for 'mpol' 23:05:16 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x60000000) 23:05:16 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x1) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8840, 0x15) 23:05:16 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1c}}, 0x0) 23:05:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500), 0x0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2478.754726] loop3: detected capacity change from 0 to 135266304 [ 2478.782876] tmpfs: Bad value for 'mpol' 23:05:36 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x99000000) 23:05:36 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB], 0x1c}}, 0x0) 23:05:36 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:05:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0xb1, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:05:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 22) 23:05:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500), 0x0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:05:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x7fff, 0x7, 0x0, 0x9097, 0x2, "1db4f162c2d7eb3598105c49c4ea44a8cba65f"}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x180) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:05:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffb, 0x4, &(0x7f0000000240)=[{&(0x7f00000000c0)="1a804a3850311a75e583bc2da1db8a73b75b95064f7c98329dd3716315fd0b75b4633424d84e9ca4110c3dbae9fea891990c587cb7f9605b55c315f84c716a95fd2b4213f452ecab97b5830abf2cc99504c4623df9b1a54cae83c9de1c1fdd21ac4d7fdc3c55a5bbd47ae62b76fa99a18b9b95297375b7cdc5113416b47424254c8778efbc1fcf0a0ce2f42ab8", 0x8d, 0xfffffffffffffe01}, {&(0x7f0000000180)="dfc94b408e0ea04a23ff94ef8b8d99e2551cfacaaa10de12ec4e73407fe869614b34df8380cee9d8c7f74504b4279cf0d7b8329140edc9cfdbd5a4a38509c9ba42e5647ac789607e57615728f3ae1954e6b624f3492c21985e585f7e549eeff6bb1e4712846fd127baee5d37e65d98e700cf9cf953fb5302b20f62cfac78a6738ac8b3e5cf1c6182205b82e38dead559a39c09164ef1fa329a1a236596a9bf05a4b2eaff832aed7878af1062", 0xac}, {&(0x7f0000000380)="b2ac00ce596796baad49b08d7b0ee7b627cdc397840fd818b9f354d7ded8eb15a4c8e21dc5318553d53031995a82c754449a8a38691932809cfb3f2fe3ba1ffc2af23e94de741e425004068921d9ae7c3edc2ede70c3781b092d29cfde0606b6d21a41220884fc7cc6e26e4f853ee758ba7430c3940b1e0697026c292744438754e9264881e0575abdd2af28aad78962ec49c0c2c369136509d47602f5288419087b86d1bb6a2d7201f4ea7500c811da0279d8ded14e989c85fdc8e320af215ae799dedaad220fd2ed8baeed89ff2124fa87a3fd6dc12e6fe84d8042176a0fc4873b521e79a76c9f3bfa847cf18eb34835fa2de447d2ae138b8ec81ea297e9521c0aeddc46ebfa96e6f67d83af870d507e19c51d5c74e8e0f3fe7aca026092a4e3c9a84e0b3b6a6e1e0870ed097bac5d79bac6ee937a95ba77ae7fcd3d6b8e040e2d9933ca03258afd53f4a08a397e35f47764a929dca061564556f334b98f3186fd08f7747587da5902dfcf1b8c89d094ef3a1f43b5d17c590338130a59b9cd83316eca6420a7b3300b7723f7ed55789d085d4a6dcd68d04979f27e32b6ba7d8da575e366e8978d15bc7223e1bf73c5a8171cd1f4baff1dfe8e8ecccb1dc3dc851258ebca1fc1d81b6e66292f558ea4dab583b6a2a468138615289fc44131b364e75072d84366d2f5f1173b85fdce898b109bd175daff9492ea14d962a8b2a792611cc5429f322d682a7ebfdac1dffcd68bdb15973548317c448f65837e2307a37a6dc8d06bd7b78d6ba5ee55cb137773002a2a6e66bd4efb09ddca90a585c2ab6ab4f989ad9dfb50206e8472f0568e87391a11ab7a14876755ea8f54947230e1f445be10c0964daa06d2d1021b6fb7ff4a948c074d8e40ceadd9bda807a22d99770cff51c908a6ad8a9c9296d1aefd680d69d8e396a043ae703a5ade16e9806adb9d3cbf8c10b9d450021458e132f85abb84e5a6df04a1ba3f8b5129e87546e0e9392455f136c5ff6ddd140bb2757d50b6d6ecf6e92659da87978e6d72dce28d01fe0497faff25e6363dd2774da41efc24a914dbeba870a76bf40c640a17d60512e2573ca34d00887c5f14a17483b5206a40ee14da3bb72b300d9f6efb1cc696b5668838a60736bd2b321864a5a21e8e4777db89ffdbbf040daebc58648f9bb2c51ea3d2da05f9498085cf5943eebbbdd94efbcc38c12989193f101c5c427298741561fca610fb7ee4d8991762e5f14aa711a132f8a0894c25d1d53194bf5380a7989fc871bbad483f9be23954651be85f659f79e68380542c58dafe24d5bc2b014134db09219e97a310c4935c4bdef7cf84c6185fee66fe2b4437cee713b8f662b2f95b2db95da39a0ea6deb2b809351a097cd9276d90c83780e86ec480f9aebe803a0c9d9d566451aa8f7cc2eb79ebea4b6bd2ffca499fd9b5708831cb32c4710810fc7378be2c1a8fd6cbd8d0bfed22e3d6113bc04c8f17492b31645008c878560b0ed5b2572692593cf4fd9ff77c196b082da0ba8e4be5cbf65a95580705deba501fefd1d0b11c4934b926ee1bac4e97947ed16f98e35d59e8770bea801dd99e919bfe65295307d81ad2fb5819fe7389ac9644d78d400e495b183a69896bb76fe20d0aaf2df5f11326a0450c3353abd2070685c0b7b6260a2b88bf1711869c59ef4d17e1d3a1c2b0caca54b25df54613edaff09088f381336559068c2dd23c8d9586aead986dd0fd46523e9e12038befb946e96d880b7d58b7ae80e05181411a5a46e1ce1a1a65c916b91cc2e807189663d1ade14cc69eac88a56642565588270bf8e2b89f99a1ed0d52ba2a26ed4857aeef001533fdb76bb9be411eb0a9264639c84700bfb96c2b54dea7e2a0be9e654df4342e8ddebd21c7afd1e02df87a1d03022cc5a1c489b74244ffb4542baff2963cc85f793ca628ad3ed0fdf42e8ea5d338ccd1f8144372fb5cfac10beb5dc7b36bd7b6915961a64715eec2eece65fcc2539e7b94b97226ae00bb59f7d0e393f8e1e9cab43ba3ae6c8a30e0bef8724ea5e20c7f0a373bf5636f767ad4ead49825270e416bece1d3cc270cc74bd20ba80f93c0eb0f6dcb1b4ac73ff7d6d5e4debf8d2738fabe3ea62fdb12911fba9c2bb72b0196b6c7a660920b139cc8b1e7e19441c9622346733fc83b8fd8eeea484c726cf24b78efd76240e4f1443a25da4f3f6be649b6caded8bcf565732089a041b2dba95db9ce0c5e496c764b53cbb2a3206036d8c9f63a5599195ea0905e3ed871eb918b93de894d9e899a4bcb1844e6f002cc76647a79fa4074103178c634c0ef0ab5868b93cc7cf4850f90ea161265b60ef818600f5e6ea460ac038a844169d5881e2edc23b39d9b44b5e53e083a6d29620d2cc6798468814458c25ed68a34b2e8b3b97bd085d76893794c8c0c9007cd7651a4626790246c6f5af798ae896634238d389572c5fba5c77f26c5be5cb73f546a4e2b1db727348531c8638e44c6ebc93d552eecd2644674e745e5ca8da3313decb84ddcd1d1e951222422650ad62fac229d03e6f73e091ceeecce34fd35fc63fd7b3ef9223cbc46711f1776b26fd6ee187fb687c7242bfa947777ab785a879c4931683626c30cca4cc7cc95e60de9022f51f22fc0510eb5dc47a7a8f5a2a91eccdd52318b12f304ccf0a0543f4fdfd2bb6c100668874cfa9e361ec01de2afef1fe98443ff853a35a4c039115c4b2dfe0fb7d2cd3bb34c4b424dc128e98e5d0ab7ab0d9a447a4c6c25e3ddb8263d705627aff15031c7ad80f8adee0ec921707a482cf622f9331639906d7a1bb2633f994849b9a5da8b80673066e2f6763cd10bd91e92f6190c11948a6ef42bba1e0addcffe079e446527efde289847213da8d493f191d19a3eee7655a53e581932853ebcf6f089d235415fccf70ef7fe2ffe3eed8d89e4b9c36516e33abfd9dc0cc8bc4e0de80a146d03fb3e47f4fb5572fdfd27133ef42df6003e8bb33213d63085893200f90f97b9cf20661578b3777b4eb3645297656e888d9e8eca31eff5680f9c6944cd2994cbf7e44906157ba37ebbc51c7136eedf247cb26ebfbfbe02d0be594dd8b790a249f1b181f78cecb57dac63d6d9ae0c22d4ccabecd2ac00015b79ef964a8a96e7e204e6b7f1fb229f16403dcc8c296a4a713bbdb1707422ceb82b2601d3c0c29eeeb826c97b838c80687137b2a95917147eeb2d6abaeb245f4cc4f03ab5414593b451c779c8772f98e480180a95788c07c5a980b23dff237bd4265b8e0fc216a903d168c2e2b2ce60e6a9d7e21f5e80ad3fa49b5765a6975d32528b7682004fdf5f8be43ca9f81b911c60330a7a2b9f3149f234c3a2d639c2403b3a5355ff1058746be784717ebfb6086e72427fddcbe1800af245887b838aa627715067388fa378a57c8b5dff2e25f2cb0d17a83df06650126804617dc8eb796dd345d2f9fe120b1e1029e56a37188a6c088bb60ede53af143e784d8d72f99f7fdcb4c9086e5d318aa9f2947ba1a3ab7946cde87c15a8dae7d0d758453a717ee9fba9dc9392f1976cd9f3cf3191057ea84a0f8517c048d9245ce6038de0d8ad6781ef847694ca61ca2d7a2ce3d4b2bc577c9b484f86bfe02076aa57819d6c093aa8c7fbe5a953b445a22ea14bc844ec4f6e878432bc49c03c61d53dfd6532a080f1209bc5380c2ea6d501395b1cd42f3e2ca90879195bf1f3155331d5b3399cf9303112186f045838d15d5ce9f7766a15cf2be4279a4e47eac08dc3c997f13c462b683209af0022e0d7e9547f79b288e415feda4bf152088e89b64a37dc3aeeae1a1affb2525d694c51b0f85cd23ae87794e683c727f51249aac45bf841689e149f0884c5a69722cf7a54f10004ed4852e32e4c2f76f7eacf19732384710ab347e38a9b1210e1a0be30d7ecd3e8b92d44056ddfca73b66e49da98b28e3462c3d7f522c715b90a398aa55472ef425d85113e5a9d909969970cb700262de4302cacedc726de3668c3c6d867a57920b4ac460735f165301a8e72f712a2c41981701250414847d0aa02e706dd59ca7dcea3d7329a7ab3d9b7f75b118fed5eba69991f79e1eb4e0cceadb86cddca606d97bab403c6a99e2035aed9eb0e5c8065cc9cc5a4dfeefbd19d20afada340922a7e9a13294ac6b3b6efa5be373c90ecddac05135b98ff292b51ddedcb33ae65c8f89b21b994469fe39b509e10f386321f137522caeae6931f9c60face1b421aaf4ad610561fe650a726a2141403cf758baa15b9a34a66dbd2ee9d665a777251a963d5c05e8bc88b7861f308c29255b5bf62270089d766dddd7ed57e72c003eaa7bececb62ac31a569681e7803f2e1e5e9e1dc61c607620ceecbf440ff4b7cc8d18fa9737ad6433b871150949e30ade0eb9f9da8efe4c88357c7866865c74434c99729ba21d659098faacf5fcd096a3aa32b3524c7b6110f7d3a8125d63e73c21177c015bbc131710decef2363c45f68cd76d2627cfeac53f2d47b50088d5925c5521c0a4d2911aa4491d98285eaa0a5c4caff8b34c50ffebfe4957ac07197acc00ceb32bd631118851d44f241fc08629f64f1cc52ccadb5a43cd422fc6ddd7ea88a29454eaf1180e26786218791e5da0ceb91027989289551c90679fe68834927138f2bb87d96582edb7d261ca5ae4e8c9712efdb5e3e1be9e2ae44b9bbef28efa7d9bbe70d9f8ed3f0c77f43ceb9455346d26dd3e772d73d8c3799ccf5f3e6d33234c0901336d803d89b0db422cfeed284d78dfd15e9541c27cf816c8b04959a18e3a215cfae3b3ac5106101185578968c6f1fdce9eb1213c93474b340f9ac98283d737f6447ab7815473826fc6b57f23d23aedde1a068dad1b3c78b093d801c7abdda976e64dc6d81467263aa5173a635646c4c9670e2554779df5fdfb41d7368a23126ae78e9b5b740a70aadcf5116592b6414a8b21ee732d5b1d00c5d76f95919f592fc6aceeb5215c03059ee424a454fcd253caae21d021734c4c8230f59a6feba4c3f3cde85f6873db58e5560f62d27ebc3b7a7c2a90bc9485acb0b774628b8cc8421fe21b73a81be383fed0e3c64caa4a6cea1be2a33ea959b85e9698f2a56298cba3819fddfa14c9d9c6a7f90e9ebd70bf6ef09c7a13ff68426747852a8443618c6a062b510309213c140c3f8c1196d7a7cad8cb90f4483220503fd376557d2cb0e8e557b314138679526e28e758a047be17135766c554783a3c53de79bb19d85211c27792a6651f838e9281fb922acbe60f2bba4f4e9ac39a8de1a0acff08642a69f008d24a646e8c91a5749a98d69e838bdf62437dd16e57d6fe0c9d66fe726451abf0ad65638752f742aedccbc96f43e4f5da267a31d4d8a7eb39466509df737e7ef74f6849d1e646de8da5832337f5c3efcc31a7048af4d3b156de15fe44fd5d02cdfeefe0b44622daadc38f40b9832d7a25d8b5c7e2b15bd969865aa1853b74e8426b15572278160f554202cd0b3b45089e20459a0b520e692922014a355a14e1de544c75b9b3375011065981f9456e18a456355e94e02e92f6bd17d017a190b807c818f8752dc4a56430ad22bb93de5cce2b2cb0e2d5b7bf914c2351a17b1b9750e127a096a539198c1be29aeb36e76394f49abd2dcfcce8341025c377c6c9c2c80b456ebc58f2075a779efcd6f2eb8b2c9c2995a87e175b280861d0cce30e3360c6c70041351d5611eec854cc8c6aef591be9ee241b3af91a4aaa65405581bbddee9d906c89efd25e9f9d39d34671a3c36edd6e47cd382e1507c8959e1f846f4b303c27af57e9f52", 0x1000, 0x101}, {&(0x7f0000002e40)="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", 0x1000, 0xfffffffffffffff7}], 0x40, &(0x7f00000002c0)={[{'\''}, {'{\\%#%@'}, {}, {}, {'[\'+{{-#'}], [{@hash}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x64, 0x31, 0x65, 0x62, 0x33, 0x37, 0x38], 0x2d, [0x32, 0x61, 0x30, 0x34], 0x2d, [0x33, 0x63, 0x31, 0x61], 0x2d, [0x37, 0x62, 0x30, 0x34], 0x2d, [0x65, 0x36, 0x5e, 0x39, 0x34, 0x63, 0x62, 0x53]}}}]}) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) [ 2498.046510] loop4: detected capacity change from 0 to 135266304 [ 2498.055574] nfs4: Unknown parameter ''' 23:05:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ff8000/0x5000)=nil, 0x5000, 0x5, 0x2010, r0, 0x8000000) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1000008, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x4004, @fd_index=0x4, 0x1000, 0x2, 0xfffffff8, 0xd, 0x1, {0x2}}, 0x4) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) preadv2(r4, &(0x7f0000001180)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/98, 0x62}], 0x2, 0x400, 0x9, 0x0) accept(r1, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) [ 2498.069006] FAULT_INJECTION: forcing a failure. [ 2498.069006] name failslab, interval 1, probability 0, space 0, times 0 [ 2498.072055] CPU: 1 PID: 11994 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2498.073854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2498.076001] Call Trace: [ 2498.076705] dump_stack+0x107/0x167 [ 2498.077650] should_fail.cold+0x5/0xa [ 2498.078330] loop3: detected capacity change from 0 to 135266304 [ 2498.078638] ? create_object.isra.0+0x3a/0xa20 [ 2498.078667] should_failslab+0x5/0x20 [ 2498.080699] tmpfs: Bad value for 'mpol' [ 2498.081521] kmem_cache_alloc+0x5b/0x310 [ 2498.081543] ? kernel_text_address+0xf2/0x120 [ 2498.081573] create_object.isra.0+0x3a/0xa20 [ 2498.085363] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2498.086678] kmem_cache_alloc_trace+0x151/0x320 [ 2498.087873] ? find_held_lock+0x2c/0x110 [ 2498.088953] p9_client_create+0xaf/0x1230 [ 2498.090017] ? lock_downgrade+0x6d0/0x6d0 [ 2498.091163] ? p9_client_flush+0x430/0x430 [ 2498.092265] ? trace_hardirqs_on+0x5b/0x180 [ 2498.093399] ? lockdep_init_map_type+0x2c7/0x780 [ 2498.094662] ? __raw_spin_lock_init+0x36/0x110 [ 2498.095863] v9fs_session_init+0x1dd/0x1680 [ 2498.097012] ? lock_release+0x680/0x680 [ 2498.098061] ? kmem_cache_alloc_trace+0x151/0x320 [ 2498.099306] ? v9fs_show_options+0x690/0x690 [ 2498.100470] ? trace_hardirqs_on+0x5b/0x180 [ 2498.101589] ? kasan_unpoison_shadow+0x33/0x50 [ 2498.102777] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2498.104096] v9fs_mount+0x79/0x8f0 [ 2498.105028] ? v9fs_write_inode+0x60/0x60 [ 2498.106103] legacy_get_tree+0x105/0x220 [ 2498.107164] vfs_get_tree+0x8e/0x300 [ 2498.108132] path_mount+0x1429/0x2120 [ 2498.109299] ? strncpy_from_user+0x9e/0x470 [ 2498.110416] ? finish_automount+0xa90/0xa90 [ 2498.111533] ? getname_flags.part.0+0x1dd/0x4f0 [ 2498.112939] ? _copy_from_user+0xfb/0x1b0 [ 2498.114026] __x64_sys_mount+0x282/0x300 [ 2498.115167] ? copy_mnt_ns+0xa00/0xa00 [ 2498.116286] do_syscall_64+0x33/0x40 [ 2498.117410] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2498.118754] RIP: 0033:0x7ff784b43b19 [ 2498.119724] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2498.124868] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2498.126853] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2498.129023] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2498.130916] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2498.132787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2498.132802] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:05:36 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x9effffff) 23:05:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3", 0x75, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:05:36 executing program 4: setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{0x304}, "b44187e420575257", "48dc82bcc6f40ece613724f39174d1c4", "6518c250", "6b953281f5e74abc"}, 0x28) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00') setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0xfffffffffffffffe, 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x8883, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='macvtap0\x00', 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r4, &(0x7f0000001e00)=""/4095, 0xfff) 23:05:36 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba"], 0x1c}}, 0x0) 23:05:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) 23:05:36 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf0ffffff) [ 2498.317361] loop3: detected capacity change from 0 to 135266304 [ 2498.319524] tmpfs: Bad value for 'mpol' 23:05:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 23) 23:05:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3", 0x75, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:05:36 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xfcffffff) [ 2498.507663] FAULT_INJECTION: forcing a failure. [ 2498.507663] name failslab, interval 1, probability 0, space 0, times 0 [ 2498.511385] CPU: 1 PID: 12040 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2498.513099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2498.515089] Call Trace: [ 2498.515889] dump_stack+0x107/0x167 [ 2498.516742] should_fail.cold+0x5/0xa [ 2498.517614] ? create_object.isra.0+0x3a/0xa20 [ 2498.518770] should_failslab+0x5/0x20 [ 2498.519793] kmem_cache_alloc+0x5b/0x310 [ 2498.520882] ? lock_downgrade+0x6d0/0x6d0 [ 2498.521844] create_object.isra.0+0x3a/0xa20 [ 2498.522924] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2498.524081] __kmalloc_track_caller+0x177/0x370 [ 2498.525170] ? p9_client_create+0x41d/0x1230 [ 2498.526175] kstrdup+0x36/0x70 [ 2498.526907] p9_client_create+0x41d/0x1230 [ 2498.527867] ? lock_downgrade+0x6d0/0x6d0 [ 2498.528835] ? p9_client_flush+0x430/0x430 [ 2498.529795] ? trace_hardirqs_on+0x5b/0x180 [ 2498.530780] ? lockdep_init_map_type+0x2c7/0x780 [ 2498.531856] ? __raw_spin_lock_init+0x36/0x110 [ 2498.532915] v9fs_session_init+0x1dd/0x1680 [ 2498.533900] ? lock_release+0x680/0x680 [ 2498.534814] ? kmem_cache_alloc_trace+0x151/0x320 [ 2498.535905] ? v9fs_show_options+0x690/0x690 [ 2498.536927] ? trace_hardirqs_on+0x5b/0x180 [ 2498.537913] ? kasan_unpoison_shadow+0x33/0x50 [ 2498.538953] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2498.540109] v9fs_mount+0x79/0x8f0 [ 2498.540937] ? v9fs_write_inode+0x60/0x60 [ 2498.541872] legacy_get_tree+0x105/0x220 [ 2498.542773] vfs_get_tree+0x8e/0x300 [ 2498.543603] path_mount+0x1429/0x2120 [ 2498.544495] ? strncpy_from_user+0x9e/0x470 [ 2498.545476] ? finish_automount+0xa90/0xa90 [ 2498.546456] ? getname_flags.part.0+0x1dd/0x4f0 [ 2498.547518] ? _copy_from_user+0xfb/0x1b0 [ 2498.548478] __x64_sys_mount+0x282/0x300 [ 2498.549400] ? copy_mnt_ns+0xa00/0xa00 [ 2498.550295] do_syscall_64+0x33/0x40 [ 2498.551139] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2498.552319] RIP: 0033:0x7ff784b43b19 [ 2498.553109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2498.557025] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2498.558639] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2498.560148] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2498.561671] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2498.563183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2498.564710] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2498.633476] loop3: detected capacity change from 0 to 135266304 [ 2498.643929] tmpfs: Bad value for 'mpol' 23:05:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3", 0x75, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:05:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 24) 23:05:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7472617473223453b3b3146ab43d66642c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) getsockopt$inet6_buf(r1, 0x29, 0x44, &(0x7f0000000200)=""/165, &(0x7f0000000000)=0xa5) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001780)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x7fffffff) sendmsg$inet6(r3, &(0x7f0000001640)={&(0x7f0000000080)={0xa, 0x4e22, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x2}, 0x1c, &(0x7f0000001500)=[{&(0x7f00000002c0)="3aa259582625684718cfe3e4948bb9a37b5cbde0a9dbb3d6f6a83ae6863492f822ac3c", 0x23}, {&(0x7f00000003c0)="2f0fa7f392f0c2e1f4103bb5eab73b181b6b8e4baf8e1d328ebb4938bdf55bd25b072b1fb0975b1708ad39786ea63de954cf720f0bafeb53e62107313aeeb533e6ce89db51de58c6560855eb1f1b47bc165aa65c30bd132defcf57e50de9b3d3966b53cc05b3ebc1e754dc00e2ef5cb1569e4ced491fcef2d3", 0x79}, {&(0x7f0000000300)}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="71668f0ce85f19e81d6877b93d22e9211addebf4b6f8e78da0f24aa1f32e9dc5d48cf8e7da1f44c52844e4c707cb21bcab2a90dd38556b44a683092f21dcd39bbd6b04108ff3cd8bdaec1f93b74da8ca4de2f6a3853150f7f1895d6997b5eb5146aead96b770ded4e479ae776520fd292a3f639f9901228f7df7e395a78ce4c94a362d3e96bfa894165744abd0974f9fe886", 0x92}], 0x5, &(0x7f0000001580)=[@dontfrag={{0x14, 0x29, 0x3e, 0xf9ce}}, @dontfrag={{0x14, 0x29, 0x3e, 0x866}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x4, 0x4, '\x00', [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x7fffffff}, @calipso={0x7, 0x10, {0x3, 0x2, 0xfe, 0x3, [0x2]}}, @enc_lim={0x4, 0x1, 0x3f}, @jumbo={0xc2, 0x4, 0x28bed383}]}}}, @tclass={{0x14, 0x29, 0x43, 0x7}}], 0xa0}, 0x801) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000001680)={0x5, {{0xa, 0x4e24, 0x5, @mcast2, 0x10001}}}, 0x88) lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000001740)=@known='security.selinux\x00') writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:05:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x81, 0x1, 0x9, 0x8, 0x0, 0x6, 0x40, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x1012, 0xd25, 0x42, 0x6, 0x81, 0x200, 0x1, 0x0, 0x7, 0x0, 0x6}, 0x0, 0xe, r0, 0x3) 23:05:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x86fe}, 0x8000}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x280002, 0xee7a01454755374a) pread64(r2, 0x0, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) tee(r2, r0, 0x0, 0x1) 23:05:52 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:05:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xfffff000) 23:05:52 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba"], 0x1c}}, 0x0) [ 2514.090708] FAULT_INJECTION: forcing a failure. [ 2514.090708] name failslab, interval 1, probability 0, space 0, times 0 [ 2514.093361] CPU: 0 PID: 12069 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2514.094793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2514.096497] Call Trace: [ 2514.097060] dump_stack+0x107/0x167 [ 2514.097810] should_fail.cold+0x5/0xa [ 2514.098601] should_failslab+0x5/0x20 [ 2514.099466] __kmalloc_track_caller+0x79/0x370 [ 2514.100412] ? p9_client_create+0x51e/0x1230 [ 2514.101337] kmemdup_nul+0x2d/0xa0 [ 2514.102069] p9_client_create+0x51e/0x1230 [ 2514.102950] ? p9_client_flush+0x430/0x430 [ 2514.103824] ? trace_hardirqs_on+0x5b/0x180 [ 2514.104731] ? lockdep_init_map_type+0x2c7/0x780 [ 2514.105713] ? __raw_spin_lock_init+0x36/0x110 [ 2514.106666] v9fs_session_init+0x1dd/0x1680 [ 2514.107552] ? lock_release+0x680/0x680 [ 2514.108378] ? kmem_cache_alloc_trace+0x151/0x320 [ 2514.109385] ? v9fs_show_options+0x690/0x690 [ 2514.110311] ? trace_hardirqs_on+0x5b/0x180 [ 2514.111214] ? kasan_unpoison_shadow+0x33/0x50 [ 2514.112159] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2514.113217] v9fs_mount+0x79/0x8f0 [ 2514.113947] ? v9fs_write_inode+0x60/0x60 [ 2514.114804] legacy_get_tree+0x105/0x220 [ 2514.115644] vfs_get_tree+0x8e/0x300 [ 2514.116416] path_mount+0x1429/0x2120 [ 2514.117223] ? strncpy_from_user+0x9e/0x470 [ 2514.118125] ? finish_automount+0xa90/0xa90 [ 2514.119028] ? getname_flags.part.0+0x1dd/0x4f0 [ 2514.120000] ? _copy_from_user+0xfb/0x1b0 [ 2514.120882] __x64_sys_mount+0x282/0x300 [ 2514.121723] ? copy_mnt_ns+0xa00/0xa00 [ 2514.122533] do_syscall_64+0x33/0x40 [ 2514.123301] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2514.124357] RIP: 0033:0x7ff784b43b19 23:05:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0xff, 0x20, 0x2, 0x0, 0x5, 0x20000, 0xf, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x42100, 0x6, 0x13a40, 0x9, 0x1, 0x7, 0x84c, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x9) [ 2514.125144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2514.129061] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2514.130683] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2514.132210] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2514.133744] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2514.135267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2514.136787] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2514.142565] loop3: detected capacity change from 0 to 135266304 [ 2514.166548] tmpfs: Bad value for 'mpol' 23:05:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 25) 23:05:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xffffff7f) 23:05:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={""/10, ""/2, @private}}}, &(0x7f0000000380)=0xe8) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f00000000c0)=@v3={0x3000000, [{0xfffffeff, 0x9f81}, {0x1, 0x80000000}], r1}, 0x18, 0x2) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x80400, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap}, {@aname}, {@mmap}, {@cachetag={'cachetag', 0x3d, 'security.capability\x00'}}, {@cache_mmap}, {@version_L}], [{@dont_hash}]}}) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:05:52 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba"], 0x1c}}, 0x0) [ 2514.275664] FAULT_INJECTION: forcing a failure. [ 2514.275664] name failslab, interval 1, probability 0, space 0, times 0 [ 2514.279824] CPU: 0 PID: 12084 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2514.281301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2514.283048] Call Trace: [ 2514.283608] dump_stack+0x107/0x167 [ 2514.284382] should_fail.cold+0x5/0xa [ 2514.285213] ? create_object.isra.0+0x3a/0xa20 [ 2514.286180] should_failslab+0x5/0x20 [ 2514.287040] kmem_cache_alloc+0x5b/0x310 [ 2514.287909] create_object.isra.0+0x3a/0xa20 [ 2514.288841] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2514.289920] __kmalloc_track_caller+0x177/0x370 [ 2514.290911] ? p9_client_create+0x51e/0x1230 [ 2514.291842] kmemdup_nul+0x2d/0xa0 [ 2514.292596] p9_client_create+0x51e/0x1230 [ 2514.293497] ? p9_client_flush+0x430/0x430 [ 2514.294393] ? trace_hardirqs_on+0x5b/0x180 [ 2514.295296] ? lockdep_init_map_type+0x2c7/0x780 [ 2514.296292] ? __raw_spin_lock_init+0x36/0x110 [ 2514.297264] v9fs_session_init+0x1dd/0x1680 [ 2514.298169] ? lock_release+0x680/0x680 [ 2514.299009] ? kmem_cache_alloc_trace+0x151/0x320 [ 2514.300020] ? v9fs_show_options+0x690/0x690 [ 2514.300957] ? trace_hardirqs_on+0x5b/0x180 [ 2514.301862] ? kasan_unpoison_shadow+0x33/0x50 [ 2514.302820] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2514.303882] v9fs_mount+0x79/0x8f0 [ 2514.304623] ? v9fs_write_inode+0x60/0x60 [ 2514.305506] legacy_get_tree+0x105/0x220 [ 2514.306400] vfs_get_tree+0x8e/0x300 [ 2514.307319] path_mount+0x1429/0x2120 [ 2514.308274] ? strncpy_from_user+0x9e/0x470 [ 2514.309355] ? finish_automount+0xa90/0xa90 [ 2514.310379] ? getname_flags.part.0+0x1dd/0x4f0 [ 2514.311406] ? _copy_from_user+0xfb/0x1b0 [ 2514.312293] __x64_sys_mount+0x282/0x300 [ 2514.313160] ? copy_mnt_ns+0xa00/0xa00 [ 2514.313993] do_syscall_64+0x33/0x40 [ 2514.314776] entry_SYSCALL_64_after_hwframe+0x67/0xd1 23:05:52 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0xbce2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x10000, 0x7, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/170, 0xaa}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000100)=""/60, 0x3c}], 0x3, 0x6, 0x7fffffff) [ 2514.315874] RIP: 0033:0x7ff784b43b19 [ 2514.316839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2514.320746] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2514.322374] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 23:05:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400f", 0xb0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2514.323888] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2514.325495] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2514.326991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2514.328484] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2514.530466] loop3: detected capacity change from 0 to 135266304 [ 2514.552467] tmpfs: Bad value for 'mpol' [ 2524.152419] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 23:06:12 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:06:12 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) 23:06:12 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xffffff9e) 23:06:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 26) 23:06:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000040)=""/125, 0x7d}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/64, 0x40}], 0x3, &(0x7f0000001140)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8}, 0x102) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001580)={&(0x7f0000001600)={0x398, 0x20, 0x2, 0x70bd2a, 0x25dfdbfc, {0x12}, [@generic="9bacff8e54278077cb369b90b3a0475b4814d559d34efc8df1354c1193ffb851bece3ebb3a", @generic="48c2ec67af49226ae74d47fe9b491a74a7cb484602f853a76d4926acbf494b781856faa12fad49b01e81106400c84d9205eaee3edecf3a4029f9d2", @typed={0x8, 0x1f, 0x0, 0x0, @u32=0x7}, @generic, @nested={0x31b, 0x14, 0x0, 0x1, [@generic="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", @generic="32f2c7d3cc11ef84c720ededaa4d9d6713612dd63e42059bce014dca5ef668d6532881c82319349cdea781b7e026e78afd47b7415a04f0fd10c7d8d80594e37ce1116d60c1d5d20e6e459d8ab198812a457d3dc47e85546920", @typed={0x4, 0x1b}, @generic="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", @typed={0x8, 0x5f, 0x0, 0x0, @fd=r0}, @typed={0x8, 0x3d, 0x0, 0x0, @uid=r1}, @generic="d2c8f6f3f8adbe38526e3ef36a13c3bb2f41542a740f77f0dff09658d4363397ef86a56ca257a31fa9fd97962662a0d55ce79dc5440b8a097c1b2c6699522dce3ecafb262724ee00df66d53d"]}]}, 0x398}}, 0xc815) 23:06:12 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0x22) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x20) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r2, 0x4004f506, &(0x7f0000000000)=0x1) pwrite64(r0, &(0x7f00000000c0)="812d2fbddc8b766a1d7e583fbfc82412c0c80c516f1dd5eb4b6d762f292d5f2169343e98e57f07ead19de7f7a04179a040e362c9d82bfb5411b19e70a657e7e6939452249f85df46c21ef9c596c4f42677698033ecdc5df3484b1e5f24da8670d1686d20ce5cab978e7c7c58048a79067cf4b5c5dd6ff5105439983c81b987e493e9d963b38fdb", 0x87, 0x8) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000001e00)=""/4100, 0x1004) 23:06:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400f", 0xb0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:06:12 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb9"], 0x1c}}, 0x0) [ 2534.458666] FAULT_INJECTION: forcing a failure. [ 2534.458666] name failslab, interval 1, probability 0, space 0, times 0 [ 2534.461111] CPU: 0 PID: 12118 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2534.462579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2534.464298] Call Trace: [ 2534.464905] dump_stack+0x107/0x167 [ 2534.465686] should_fail.cold+0x5/0xa [ 2534.466481] should_failslab+0x5/0x20 [ 2534.467274] __kmalloc_track_caller+0x79/0x370 [ 2534.468275] ? parse_opts.part.0+0x8e/0x340 [ 2534.469177] kstrdup+0x36/0x70 [ 2534.469858] parse_opts.part.0+0x8e/0x340 [ 2534.470726] ? p9_fd_show_options+0x1c0/0x1c0 [ 2534.471656] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2534.472741] ? quarantine_put+0x8b/0x1a0 [ 2534.473573] ? trace_hardirqs_on+0x5b/0x180 [ 2534.474493] ? kfree+0xd7/0x340 [ 2534.475184] p9_fd_create+0x98/0x4a0 [ 2534.475961] ? p9_conn_create+0x510/0x510 [ 2534.476827] ? p9_client_create+0x798/0x1230 [ 2534.477793] ? kfree+0xd7/0x340 [ 2534.478471] ? do_raw_spin_unlock+0x4f/0x220 [ 2534.479403] p9_client_create+0x7ff/0x1230 [ 2534.480292] ? p9_client_flush+0x430/0x430 [ 2534.481180] ? trace_hardirqs_on+0x5b/0x180 [ 2534.482098] ? lockdep_init_map_type+0x2c7/0x780 [ 2534.483092] ? __raw_spin_lock_init+0x36/0x110 [ 2534.484055] v9fs_session_init+0x1dd/0x1680 [ 2534.484972] ? kmem_cache_alloc_trace+0x151/0x320 [ 2534.485994] ? v9fs_show_options+0x690/0x690 [ 2534.486924] ? trace_hardirqs_on+0x5b/0x180 [ 2534.487822] ? kasan_unpoison_shadow+0x33/0x50 [ 2534.488780] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2534.489843] v9fs_mount+0x79/0x8f0 [ 2534.490588] ? v9fs_write_inode+0x60/0x60 [ 2534.491454] legacy_get_tree+0x105/0x220 [ 2534.492308] vfs_get_tree+0x8e/0x300 [ 2534.493085] path_mount+0x1429/0x2120 [ 2534.493894] ? strncpy_from_user+0x9e/0x470 [ 2534.494789] ? finish_automount+0xa90/0xa90 [ 2534.495696] ? getname_flags.part.0+0x1dd/0x4f0 [ 2534.496671] ? _copy_from_user+0xfb/0x1b0 [ 2534.497540] __x64_sys_mount+0x282/0x300 [ 2534.498383] ? copy_mnt_ns+0xa00/0xa00 [ 2534.499204] do_syscall_64+0x33/0x40 [ 2534.499980] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2534.501058] RIP: 0033:0x7ff784b43b19 [ 2534.501967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2534.505956] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2534.507539] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2534.509025] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2534.510556] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2534.512028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2534.513492] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2534.515222] 9pnet: Insufficient options for proto=fd [ 2534.538532] loop3: detected capacity change from 0 to 135266304 [ 2534.545186] tmpfs: Bad value for 'mpol' 23:06:12 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xfffffff0) 23:06:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:06:12 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = getuid() mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@afid={'afid', 0x3d, 0x3}}, {@uname={'uname', 0x3d, '}'}}, {@cachetag={'cachetag', 0x3d, ',.^(\'}&&##\','}}, {@noextend}, {@afid={'afid', 0x3d, 0x9}}, {@access_client}], [{@smackfsfloor={'smackfsfloor', 0x3d, '(%[,[:-:,{$'}}, {@uid_lt={'uid<', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setownex(r3, 0xf, &(0x7f00000004c0)={0x1}) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) execveat(r0, &(0x7f0000000240)='./file0/../file0\x00', &(0x7f00000003c0)=[&(0x7f00000002c0)='-{\x00', &(0x7f0000000300)='uid<'], &(0x7f0000000480)=[&(0x7f0000000400)='uname', &(0x7f0000000440)='*{\\*#$\x00'], 0x100) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) signalfd4(r4, &(0x7f0000000200)={[0x40]}, 0x8, 0x80000) [ 2534.692607] 9pnet: p9_fd_create_tcp (12136): problem connecting socket to 127.0.0.1 23:06:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 27) 23:06:13 executing program 2: clock_gettime(0x0, &(0x7f0000001440)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000014c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f0000001480)={r0, r1+60000000}, 0x1, 0x1, 0x1}, 0x6e6bc5b6) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) mount$9p_unix(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200), 0x20, &(0x7f00000002c0)={'trans=unix,', {[{@posixacl}, {@afid={'afid', 0x3d, 0x200}}, {@access_uid={'access', 0x3d, r4}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000080)=0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0/../file0\x00'}) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x37, &(0x7f00000003c0)={0xc, 0x20b, '\x00', [@pad1, @generic={0x5, 0x1000, "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"}, @calipso={0x7, 0x50, {0x2, 0x12, 0x4, 0x4, [0x24000, 0x1, 0x3f, 0x7f, 0x0, 0xc02, 0x4, 0x9, 0x2ef7]}}, @enc_lim={0x4, 0x1, 0x8}]}, 0x1068) openat(r2, &(0x7f0000000000)='./file0\x00', 0xd2400, 0x1) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:06:13 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xfffffffc) 23:06:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400f", 0xb0, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:06:13 executing program 0: ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x3, 0x7}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = getpgrp(r0) ioprio_get$pid(0x0, r1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) close(r4) perf_event_open(&(0x7f0000000000)={0x7, 0x80, 0x7, 0x1, 0x3e, 0x4, 0x0, 0xffffffffffff8001, 0x10700, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xc66, 0x2, @perf_config_ext={0x8, 0xfffffffffffff800}, 0x89404, 0x80000001, 0xffffff07, 0x5, 0x20, 0x2, 0x4, 0x0, 0xffff0000, 0x0, 0x9}, r0, 0x2, r2, 0x8) fstatfs(r3, &(0x7f00000000c0)=""/3) chdir(0x0) [ 2534.909612] FAULT_INJECTION: forcing a failure. [ 2534.909612] name failslab, interval 1, probability 0, space 0, times 0 [ 2534.912321] CPU: 1 PID: 12149 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2534.914054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2534.916168] Call Trace: [ 2534.916869] dump_stack+0x107/0x167 [ 2534.917856] should_fail.cold+0x5/0xa [ 2534.918866] ? create_object.isra.0+0x3a/0xa20 [ 2534.920135] should_failslab+0x5/0x20 [ 2534.921138] kmem_cache_alloc+0x5b/0x310 [ 2534.922225] ? legacy_get_tree+0x105/0x220 [ 2534.923349] ? vfs_get_tree+0x8e/0x300 [ 2534.924393] create_object.isra.0+0x3a/0xa20 [ 2534.925545] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2534.926857] __kmalloc_track_caller+0x177/0x370 [ 2534.928062] ? parse_opts.part.0+0x8e/0x340 [ 2534.929283] kstrdup+0x36/0x70 [ 2534.930211] parse_opts.part.0+0x8e/0x340 [ 2534.931389] ? p9_fd_show_options+0x1c0/0x1c0 [ 2534.932663] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2534.934156] ? quarantine_put+0x8b/0x1a0 [ 2534.935299] ? trace_hardirqs_on+0x5b/0x180 [ 2534.936523] ? kfree+0xd7/0x340 [ 2534.937462] p9_fd_create+0x98/0x4a0 [ 2534.938532] ? p9_conn_create+0x510/0x510 [ 2534.939637] ? p9_client_create+0x798/0x1230 [ 2534.940789] ? kfree+0xd7/0x340 [ 2534.941661] ? do_raw_spin_unlock+0x4f/0x220 [ 2534.942819] p9_client_create+0x7ff/0x1230 [ 2534.943934] ? p9_client_flush+0x430/0x430 [ 2534.945038] ? trace_hardirqs_on+0x5b/0x180 [ 2534.946161] ? lockdep_init_map_type+0x2c7/0x780 [ 2534.947178] ? __raw_spin_lock_init+0x36/0x110 [ 2534.948155] v9fs_session_init+0x1dd/0x1680 [ 2534.949078] ? lock_release+0x680/0x680 [ 2534.949934] ? kmem_cache_alloc_trace+0x151/0x320 [ 2534.950953] ? v9fs_show_options+0x690/0x690 [ 2534.951881] ? trace_hardirqs_on+0x5b/0x180 [ 2534.952840] ? kasan_unpoison_shadow+0x33/0x50 [ 2534.953807] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2534.954935] v9fs_mount+0x79/0x8f0 [ 2534.955683] ? v9fs_write_inode+0x60/0x60 [ 2534.956562] legacy_get_tree+0x105/0x220 [ 2534.957415] vfs_get_tree+0x8e/0x300 [ 2534.958219] path_mount+0x1429/0x2120 [ 2534.959034] ? strncpy_from_user+0x9e/0x470 [ 2534.959946] ? finish_automount+0xa90/0xa90 [ 2534.960859] ? getname_flags.part.0+0x1dd/0x4f0 [ 2534.961854] ? _copy_from_user+0xfb/0x1b0 [ 2534.962740] __x64_sys_mount+0x282/0x300 [ 2534.963601] ? copy_mnt_ns+0xa00/0xa00 [ 2534.964467] do_syscall_64+0x33/0x40 [ 2534.965259] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2534.966357] RIP: 0033:0x7ff784b43b19 [ 2534.967149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2534.971083] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2534.972708] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2534.974239] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2534.975768] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2534.977294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2534.978833] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2535.063668] 9pnet: p9_fd_create_tcp (12141): problem connecting socket to 127.0.0.1 [ 2535.079612] loop3: detected capacity change from 0 to 135266304 [ 2535.092582] tmpfs: Bad value for 'mpol' 23:06:13 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb9"], 0x1c}}, 0x0) 23:06:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='=\x00'/15, @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d04193b894023a17f9bf57fae33a48c05bfd431c2159c9e5df76a398bc982b815e663352e9aaf87e4906c10f7c4ab298660ce63a2ad91e1ebad3cb935c18e11dfc7ba868e52fc0bdfbdfc77664e0017e44cf1d9d5d3fd69c3246a2c44897225a580b790a54eb3b4c6", @ANYRES64, @ANYBLOB='\x00\x00']) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) r2 = fsmount(r0, 0x0, 0x963e727c88be7de6) setsockopt$packet_int(r2, 0x107, 0x33109f1c0d2ba758, &(0x7f0000000140)=0x9, 0x4) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') openat(r4, &(0x7f0000000100)='./file0/../file0\x00', 0x86040, 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r3, 0x0) signalfd4(r3, &(0x7f0000000000)={[0x8]}, 0x8, 0x1800) 23:06:13 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x3000000000000) 23:06:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x8, 0x0, 0x0, 0x0, 0x31088, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) 23:06:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b", 0xcd, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:06:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:06:13 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0x0, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:06:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) io_setup(0x7fff, &(0x7f0000000000)=0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) r4 = syz_open_dev$vcsn(&(0x7f0000000040), 0x3, 0x103400) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0), 0x10140, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000003c0)={r1, 0x0, 0x5, 0xffffffffffffff41}) r8 = memfd_create(&(0x7f0000000500)='\x00', 0x2) r9 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x121400, 0x0) r11 = perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x3f, 0x9, 0x5, 0x22, 0x0, 0x6d7, 0x56001, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x956, 0x2, @perf_bp={&(0x7f0000000780), 0xc}, 0x44410, 0x100000000, 0x9, 0x3, 0x0, 0x6, 0x5, 0x0, 0x5, 0x0, 0x8}, 0xffffffffffffffff, 0x1, r0, 0x8) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r12, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) r14 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a80), 0x40, 0x0) io_submit(r2, 0x8, &(0x7f0000000b00)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, r3, &(0x7f00000000c0)="2736add98a85cf73a6f2402f7475cf9951265862a52a8a88341fad37cdef10a877eca5e1fbb255cb604f0f1e89fe5b722220fb0b1f8f9edfc70be43a09d8408dc2c249dd9508908c4d9cc91d659b351cf23608b89d9d602b74aaae4b5abc96111b762fa5a97668c222e41456e571e4862d5814cdf8ef185723404c3a6433f42bb5e6b82a39acd88d7a138b0ac92529fda53e608a39aba0af0edf8eb30f013b7e75f5636dc69269", 0xa7, 0x9, 0x0, 0x3, r4}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x40, r5, &(0x7f0000000200)="4323b93ad828f84253728597a0a92fe21107999eecc9ddf8ad68e20fccb3306beba9c8", 0x23, 0x854, 0x0, 0x2, r6}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x7, 0xbd, r7, &(0x7f0000000400)="216060bece9015df8d302321e8ad14f66f4bc3a06171a1ce8d30c350ad8e17175ada096d1e6a87d64406dbbf3e69cd57ff35bc57d11491e970972f80073f73c7aa182d83dcd1b0f43249d3f09085a85b36b1a9cb3c1710e8071784231152de192c65e3ecb82996862929636b09a962d2c8bb163cf600146787d33e148944051fae85", 0x82, 0x7, 0x0, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x7, r8, &(0x7f0000000540)="aae6306d8ba2dc756d90b95e92130b93ebda3ec3585a8f134f5954249a2a5fd5216980df24cd85a954ba211e5d881090cdac46dfb0ce85e044fe54fa5776050eef6cfe32e09d5231163d81a6432e6f099552634fdc82b5f9d80f5768c6b849fda0868d0c20bbd2e0ef8c21fe1cce03e9f3914f00488b506223ba7f6496c1509d4a58347cf50f265f54734074e1670634e91718b1bbcbce7248433692e6fff2a3eb54c9ac1bfcb3b134e67dec21612a13d1d2e2c069a6d58122d03a22b4f0119d24dde9e2518fe092f78a21bfd4ca127ae83716e2c9f794b2ec63812d193cbda7ba545353a2d83cdefb9a17b2a9f22b27fe23eae3a4c480", 0xf7, 0x400, 0x0, 0x2}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x6, 0x3, r9, &(0x7f00000006c0)="fb039a5770150dbb777369e9730268f03fe42de21961b1fb96276e5676c1c1d51f7e31", 0x23, 0x1, 0x0, 0x1, r10}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x2, 0xffff, r11, &(0x7f0000000840)="6977c88bb9d46c2b00a155f42c36a1e8f9eab92dd3131e03bf5a43b08fa2c8f2935ff0f2186d9310ec7967bb184f3e2f51e42d1a6835d6e9f50cdcefc2", 0x3d, 0x4, 0x0, 0x1}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0xfff7, r12, &(0x7f00000008c0)="edfb356a9f5073c84509c50f5402ed1ec084936c72c2749014312ca51022903715eaf34da4b8fdb1ebf243f2a0d0fbe0639b107afc0c87436560dc2f9ede01092395175902a3aa6a78d16266cca3fc7cbdd5bccf1a1acef6a093968f2c174ac54c2ca64a3e8cb34bfe5b296bc352df006f212ff897a977ea9c171f1862193d760db15735f7f1af3f03bee5d5f73677704cecc678815eec719e74497467f1ce73b3829d0455d839a393617b9f59e6553033c8d88ec8b8262cd8740da6e7a913e9bda4dccf93e77071fc00d21effca692a7a12ecf1614286d2ad1072df489e96ea77", 0xe1, 0x1f, 0x0, 0x0, r13}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x1, 0x200, r1, &(0x7f0000000a40)="47063ecf6a1f58", 0x7, 0x0, 0x0, 0x0, r14}]) 23:06:13 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x8000000000000) [ 2535.432889] loop3: detected capacity change from 0 to 135266304 [ 2535.442602] tmpfs: Bad value for 'mpol' 23:06:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f00000003c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 23:06:13 executing program 0: perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r4, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r5, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB="0100000001d0fd", @ANYRESHEX=r6, @ANYBLOB="0100"]) syz_io_uring_setup(0x6c75, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x402}, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r9, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, 0x0, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd, 0x11aa7d53, 0x0, 0x0, 0x12, 0x1, {0x0, r10}}, 0x6) syz_io_uring_submit(0x0, r3, &(0x7f0000000340)=@IORING_OP_READV=@pass_iovec={0x1, 0x3, 0x2004, @fd_index=0x9, 0x6, &(0x7f0000000480)=[{&(0x7f0000000580)=""/214, 0xd6}], 0x1, 0x1, 0x1, {0x0, r10}}, 0x80000000) 23:06:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 28) 23:06:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b", 0xcd, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:06:31 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb9"], 0x1c}}, 0x0) 23:06:31 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x9, 0x0, 0x0, 0x80044, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x600000, 0x2, 0x11}, 0x18) getdents64(r0, &(0x7f00000000c0)=""/132, 0x84) 23:06:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x40030000000000) 23:06:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='ns\x00') getdents64(r0, &(0x7f00000007c0)=""/180, 0x200007d8) r1 = syz_open_dev$hidraw(&(0x7f00000002c0), 0x3, 0x242040) dup3(r0, r1, 0x0) getdents64(0xffffffffffffff9c, &(0x7f0000000100)=""/217, 0xd9) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r4, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x3f, 0x46, 0x0, 0xff, 0x0, 0xa4, 0x2126, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000000), 0xe}, 0x2, 0x0, 0xfff, 0x5, 0xffffffffffffffc0, 0x0, 0xc3, 0x0, 0x36, 0x0, 0x3f}, r3, 0xd, r2, 0x8) r5 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r6, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x5, 0x55, 0x7, 0x8e, 0x0, 0x80000001, 0x50bbd887991e9e20, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x8, @perf_bp={&(0x7f0000000200)}, 0x40000, 0x7, 0x3ff, 0x2, 0x100000001, 0x5, 0x0, 0x0, 0x4, 0x0, 0x20}, r5, 0xffffffffffffffff, r6, 0x1) chdir(0x0) 23:06:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="317a4a436b68aa46"]) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:06:31 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0x0, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2552.839761] 9pnet: Insufficient options for proto=fd [ 2552.847458] FAULT_INJECTION: forcing a failure. [ 2552.847458] name failslab, interval 1, probability 0, space 0, times 0 [ 2552.849885] CPU: 0 PID: 12203 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2552.851350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2552.853093] Call Trace: [ 2552.853656] dump_stack+0x107/0x167 [ 2552.854432] should_fail.cold+0x5/0xa [ 2552.855238] should_failslab+0x5/0x20 [ 2552.856048] __kmalloc_track_caller+0x79/0x370 [ 2552.857015] ? match_number+0xaf/0x1d0 [ 2552.857843] kmemdup_nul+0x2d/0xa0 [ 2552.858609] match_number+0xaf/0x1d0 [ 2552.859400] ? match_u64+0x190/0x190 [ 2552.860189] ? __kmalloc_track_caller+0x2c6/0x370 [ 2552.861212] ? memcpy+0x39/0x60 [ 2552.861915] parse_opts.part.0+0x1f3/0x340 [ 2552.862819] ? p9_fd_show_options+0x1c0/0x1c0 [ 2552.863778] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2552.864882] ? trace_hardirqs_on+0x5b/0x180 [ 2552.865861] ? kfree+0xd7/0x340 [ 2552.866585] p9_fd_create+0x98/0x4a0 [ 2552.867373] ? p9_conn_create+0x510/0x510 [ 2552.868244] ? p9_client_create+0x798/0x1230 [ 2552.869168] ? kfree+0xd7/0x340 [ 2552.869863] ? do_raw_spin_unlock+0x4f/0x220 [ 2552.870805] p9_client_create+0x7ff/0x1230 [ 2552.871703] ? p9_client_flush+0x430/0x430 [ 2552.872591] ? trace_hardirqs_on+0x5b/0x180 [ 2552.873498] ? lockdep_init_map_type+0x2c7/0x780 [ 2552.874499] ? __raw_spin_lock_init+0x36/0x110 [ 2552.875460] v9fs_session_init+0x1dd/0x1680 [ 2552.876373] ? kmem_cache_alloc_trace+0x151/0x320 [ 2552.877378] ? v9fs_show_options+0x690/0x690 [ 2552.878316] ? trace_hardirqs_on+0x5b/0x180 [ 2552.879219] ? kasan_unpoison_shadow+0x33/0x50 [ 2552.880172] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2552.881234] v9fs_mount+0x79/0x8f0 [ 2552.881977] ? v9fs_write_inode+0x60/0x60 [ 2552.882861] legacy_get_tree+0x105/0x220 [ 2552.883713] vfs_get_tree+0x8e/0x300 [ 2552.884494] path_mount+0x1429/0x2120 [ 2552.885295] ? strncpy_from_user+0x9e/0x470 [ 2552.886197] ? finish_automount+0xa90/0xa90 [ 2552.887108] ? getname_flags.part.0+0x1dd/0x4f0 [ 2552.888061] ? _copy_from_user+0xfb/0x1b0 [ 2552.888936] __x64_sys_mount+0x282/0x300 [ 2552.889784] ? copy_mnt_ns+0xa00/0xa00 [ 2552.890619] do_syscall_64+0x33/0x40 [ 2552.891403] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2552.892475] RIP: 0033:0x7ff784b43b19 [ 2552.893255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2552.897115] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2552.898730] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2552.900227] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2552.901729] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2552.903243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2552.904750] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2552.913369] 9pnet: Insufficient options for proto=fd [ 2552.940556] 9pnet: Insufficient options for proto=fd 23:06:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r3, 0xffffffffffffffff, 0x0) open_by_handle_at(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070517a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f79fb77689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0b7e48d66203f38287876724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a27ffd74255ef37a"], 0x420800) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="030000000000000001000000000000000300000006000000010000000000000000000000000000000000000001000000142100000000000000000000000000000000000000000000a50a7f4b50c7ccb9deeac37691982153b5a34d0af67b5746f090d44fed826ed79c9fc595969adeba0fa467ff8924877b4777c87085935dd9b4ed354e4cd0342d56cfceb05ca67405dab3b456d91a7408a913b5686ceaba2fa77bc66c18cc625cc73b40921765033f7bc7c44cef84945f689700579ba4c60581321a6c518266c8f63e522a0ea6775b298a1518821a62e6d8e37e135a90a7f4d08d0e6a1587e7b90164a4ba806a75112ec812d76f722b6d40523d54bae5985f0d38efcd5094a7"]) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2552.996659] loop3: detected capacity change from 0 to 135266304 [ 2553.009572] tmpfs: Bad value for 'mpol' 23:06:31 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172"], 0x1c}}, 0x0) 23:06:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 29) 23:06:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf0ffffffffffff) 23:06:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) [ 2553.223092] FAULT_INJECTION: forcing a failure. [ 2553.223092] name failslab, interval 1, probability 0, space 0, times 0 [ 2553.225506] CPU: 1 PID: 12233 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2553.226964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2553.228763] Call Trace: [ 2553.229320] dump_stack+0x107/0x167 [ 2553.230081] should_fail.cold+0x5/0xa [ 2553.230885] ? create_object.isra.0+0x3a/0xa20 [ 2553.231838] should_failslab+0x5/0x20 [ 2553.232630] kmem_cache_alloc+0x5b/0x310 [ 2553.233488] create_object.isra.0+0x3a/0xa20 [ 2553.234409] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2553.235470] __kmalloc_track_caller+0x177/0x370 [ 2553.236441] ? match_number+0xaf/0x1d0 [ 2553.237259] kmemdup_nul+0x2d/0xa0 [ 2553.237978] match_number+0xaf/0x1d0 [ 2553.238821] ? match_u64+0x190/0x190 [ 2553.239632] ? __kmalloc_track_caller+0x2c6/0x370 [ 2553.240710] ? memcpy+0x39/0x60 [ 2553.241434] parse_opts.part.0+0x1f3/0x340 [ 2553.242392] ? p9_fd_show_options+0x1c0/0x1c0 [ 2553.243336] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2553.244436] ? trace_hardirqs_on+0x5b/0x180 [ 2553.245342] ? kfree+0xd7/0x340 [ 2553.246040] p9_fd_create+0x98/0x4a0 [ 2553.246826] ? p9_conn_create+0x510/0x510 [ 2553.247694] ? p9_client_create+0x798/0x1230 [ 2553.248609] ? kfree+0xd7/0x340 [ 2553.249302] ? do_raw_spin_unlock+0x4f/0x220 [ 2553.250224] p9_client_create+0x7ff/0x1230 [ 2553.251129] ? p9_client_flush+0x430/0x430 [ 2553.252010] ? trace_hardirqs_on+0x5b/0x180 [ 2553.252910] ? lockdep_init_map_type+0x2c7/0x780 [ 2553.253907] ? __raw_spin_lock_init+0x36/0x110 [ 2553.254874] v9fs_session_init+0x1dd/0x1680 [ 2553.255768] ? lock_release+0x680/0x680 [ 2553.256604] ? kmem_cache_alloc_trace+0x151/0x320 [ 2553.257604] ? v9fs_show_options+0x690/0x690 [ 2553.258535] ? trace_hardirqs_on+0x5b/0x180 [ 2553.259437] ? kasan_unpoison_shadow+0x33/0x50 [ 2553.260385] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2553.261437] v9fs_mount+0x79/0x8f0 [ 2553.262175] ? v9fs_write_inode+0x60/0x60 [ 2553.263029] legacy_get_tree+0x105/0x220 [ 2553.263914] vfs_get_tree+0x8e/0x300 [ 2553.264704] path_mount+0x1429/0x2120 [ 2553.265547] ? strncpy_from_user+0x9e/0x470 [ 2553.266509] ? finish_automount+0xa90/0xa90 [ 2553.267462] ? getname_flags.part.0+0x1dd/0x4f0 [ 2553.268484] ? _copy_from_user+0xfb/0x1b0 [ 2553.269358] __x64_sys_mount+0x282/0x300 [ 2553.270217] ? copy_mnt_ns+0xa00/0xa00 [ 2553.271049] do_syscall_64+0x33/0x40 [ 2553.271812] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2553.272863] RIP: 0033:0x7ff784b43b19 [ 2553.273634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2553.277427] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2553.279060] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2553.280620] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2553.282177] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2553.283700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2553.285170] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:06:54 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0x0, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:06:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 30) 23:06:54 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x100000000000000) 23:06:54 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) fdatasync(r1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$PTP_CLOCK_GETCAPS(r2, 0x80503d01, &(0x7f0000000040)) 23:06:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x80}, 0x0, 0x10003, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x820c2, 0x104) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:06:54 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172"], 0x1c}}, 0x0) 23:06:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/10], &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000100)='jfs\x00', 0x60, &(0x7f0000000140)='rfdno') 23:06:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b", 0xcd, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2575.952127] FAULT_INJECTION: forcing a failure. [ 2575.952127] name failslab, interval 1, probability 0, space 0, times 0 [ 2575.954415] CPU: 0 PID: 12261 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2575.955808] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2575.957456] Call Trace: [ 2575.957995] dump_stack+0x107/0x167 [ 2575.958727] should_fail.cold+0x5/0xa [ 2575.959515] should_failslab+0x5/0x20 [ 2575.960284] __kmalloc_track_caller+0x79/0x370 [ 2575.961211] ? match_number+0xaf/0x1d0 [ 2575.961998] ? kfree+0xd7/0x340 [ 2575.962673] kmemdup_nul+0x2d/0xa0 [ 2575.963404] match_number+0xaf/0x1d0 [ 2575.964165] ? match_u64+0x190/0x190 [ 2575.964918] ? __kmalloc_track_caller+0x2c6/0x370 [ 2575.965921] ? memcpy+0x39/0x60 [ 2575.966592] parse_opts.part.0+0x1f3/0x340 [ 2575.967463] ? p9_fd_show_options+0x1c0/0x1c0 [ 2575.968524] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2575.969590] ? trace_hardirqs_on+0x5b/0x180 [ 2575.970460] ? kfree+0xd7/0x340 [ 2575.971151] p9_fd_create+0x98/0x4a0 [ 2575.971908] ? p9_conn_create+0x510/0x510 [ 2575.972742] ? p9_client_create+0x798/0x1230 [ 2575.973629] ? kfree+0xd7/0x340 [ 2575.974289] ? do_raw_spin_unlock+0x4f/0x220 [ 2575.975192] p9_client_create+0x7ff/0x1230 [ 2575.976061] ? p9_client_flush+0x430/0x430 [ 2575.976926] ? trace_hardirqs_on+0x5b/0x180 [ 2575.977961] ? lockdep_init_map_type+0x2c7/0x780 [ 2575.979030] ? __raw_spin_lock_init+0x36/0x110 [ 2575.979971] v9fs_session_init+0x1dd/0x1680 [ 2575.980855] ? lock_release+0x680/0x680 [ 2575.981670] ? kmem_cache_alloc_trace+0x151/0x320 [ 2575.982647] ? v9fs_show_options+0x690/0x690 [ 2575.983624] ? trace_hardirqs_on+0x5b/0x180 [ 2575.984501] ? kasan_unpoison_shadow+0x33/0x50 [ 2575.985420] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2575.986448] v9fs_mount+0x79/0x8f0 [ 2575.987180] ? v9fs_write_inode+0x60/0x60 [ 2575.988019] legacy_get_tree+0x105/0x220 [ 2575.988844] vfs_get_tree+0x8e/0x300 [ 2575.989595] path_mount+0x1429/0x2120 [ 2575.990370] ? strncpy_from_user+0x9e/0x470 [ 2575.991256] ? finish_automount+0xa90/0xa90 [ 2575.992124] ? getname_flags.part.0+0x1dd/0x4f0 [ 2575.993058] ? _copy_from_user+0xfb/0x1b0 [ 2575.993904] __x64_sys_mount+0x282/0x300 [ 2575.994720] ? copy_mnt_ns+0xa00/0xa00 [ 2575.995526] do_syscall_64+0x33/0x40 [ 2575.996286] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2575.997322] RIP: 0033:0x7ff784b43b19 [ 2575.998089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2576.001771] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2576.003356] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2576.004798] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2576.006232] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2576.007675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2576.009115] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2576.010858] 9pnet: Insufficient options for proto=fd [ 2576.089498] loop3: detected capacity change from 0 to 135266304 [ 2576.093369] tmpfs: Bad value for 'mpol' 23:07:14 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x0, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:07:14 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x84) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f0000000080)='./file0/../file0\x00', 0x84280, 0x2) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:07:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000000)=0x8, 0x4) chdir(0x0) 23:07:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 31) 23:07:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x200000000000000) 23:07:14 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffd}, 0x0, 0xe, 0xffffffffffffffff, 0xf) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0xff}}, './file0\x00'}) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f0000000040)=0x3b22, 0x4) getdents(r2, &(0x7f0000000180)=""/142, 0x8e) 23:07:14 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172"], 0x1c}}, 0x0) 23:07:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042", 0xdc, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2596.239805] FAULT_INJECTION: forcing a failure. [ 2596.239805] name failslab, interval 1, probability 0, space 0, times 0 [ 2596.242625] CPU: 0 PID: 12284 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2596.244330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2596.246236] Call Trace: [ 2596.246843] dump_stack+0x107/0x167 [ 2596.247676] should_fail.cold+0x5/0xa [ 2596.248564] ? create_object.isra.0+0x3a/0xa20 [ 2596.249616] should_failslab+0x5/0x20 [ 2596.250490] kmem_cache_alloc+0x5b/0x310 [ 2596.251430] create_object.isra.0+0x3a/0xa20 [ 2596.252475] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2596.253644] __kmalloc_track_caller+0x177/0x370 23:07:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x4, 0x1f, 0x2, 0x0, 0x400, 0x84e4, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb85, 0x2, @perf_config_ext={0x80000001, 0xffff}, 0x100, 0x10001, 0x3, 0x9, 0x5, 0x6, 0x9, 0x0, 0x8, 0x0, 0x20}, r1, 0x6, 0xffffffffffffffff, 0x3) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6465d32f6e75d86c623002fe34d08dae37f38b4beccd5f4dd87825506438614ae6f664a53c77c38171202d44752f725b1e2060b57d1d891dbba507e9040958b5c9d364509da657cb12c3b1671e371e847b21313eba"], &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='nfs\x00', 0x1008000, &(0x7f0000000100)='/}\x00') [ 2596.254707] ? match_number+0xaf/0x1d0 [ 2596.255750] kmemdup_nul+0x2d/0xa0 [ 2596.256607] match_number+0xaf/0x1d0 [ 2596.257503] ? match_u64+0x190/0x190 [ 2596.258382] ? __kmalloc_track_caller+0x2c6/0x370 [ 2596.259506] ? memcpy+0x39/0x60 [ 2596.260307] parse_opts.part.0+0x1f3/0x340 [ 2596.261309] ? p9_fd_show_options+0x1c0/0x1c0 [ 2596.262420] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2596.263677] ? trace_hardirqs_on+0x5b/0x180 [ 2596.264708] ? kfree+0xd7/0x340 [ 2596.265468] p9_fd_create+0x98/0x4a0 [ 2596.266316] ? p9_conn_create+0x510/0x510 [ 2596.267255] ? p9_client_create+0x798/0x1230 [ 2596.268262] ? kfree+0xd7/0x340 [ 2596.269005] ? do_raw_spin_unlock+0x4f/0x220 [ 2596.270007] p9_client_create+0x7ff/0x1230 [ 2596.270972] ? p9_client_flush+0x430/0x430 [ 2596.271939] ? trace_hardirqs_on+0x5b/0x180 [ 2596.272911] ? lockdep_init_map_type+0x2c7/0x780 [ 2596.273976] ? __raw_spin_lock_init+0x36/0x110 [ 2596.275006] v9fs_session_init+0x1dd/0x1680 [ 2596.275985] ? lock_release+0x680/0x680 [ 2596.276886] ? kmem_cache_alloc_trace+0x151/0x320 [ 2596.277972] ? v9fs_show_options+0x690/0x690 [ 2596.278966] ? trace_hardirqs_on+0x5b/0x180 [ 2596.279945] ? kasan_unpoison_shadow+0x33/0x50 [ 2596.280979] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2596.282120] v9fs_mount+0x79/0x8f0 [ 2596.282915] ? v9fs_write_inode+0x60/0x60 [ 2596.283860] legacy_get_tree+0x105/0x220 [ 2596.284776] vfs_get_tree+0x8e/0x300 [ 2596.285614] path_mount+0x1429/0x2120 [ 2596.286470] ? strncpy_from_user+0x9e/0x470 [ 2596.287428] ? finish_automount+0xa90/0xa90 [ 2596.288404] ? getname_flags.part.0+0x1dd/0x4f0 [ 2596.289431] ? _copy_from_user+0xfb/0x1b0 [ 2596.290374] __x64_sys_mount+0x282/0x300 [ 2596.291276] ? copy_mnt_ns+0xa00/0xa00 [ 2596.292162] do_syscall_64+0x33/0x40 [ 2596.292990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2596.294136] RIP: 0033:0x7ff784b43b19 [ 2596.294962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2596.299061] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2596.300745] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2596.302314] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2596.303890] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2596.305462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2596.307033] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2596.326240] loop3: detected capacity change from 0 to 135266304 [ 2596.331487] tmpfs: Bad value for 'mpol' 23:07:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x300000000000000) 23:07:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x511743, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ocfs2\x00', 0x56cf904b6eb9ea56, &(0x7f0000000100)=':**/{.\x00') getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:07:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042", 0xdc, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:07:14 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0x8) chdir(0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) perf_event_open(&(0x7f0000000040)={0xa, 0x80, 0x3, 0x9, 0xdb, 0x7, 0x0, 0x36, 0x43, 0xc, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb21, 0x6, @perf_bp={&(0x7f0000000000), 0x4}, 0x2009, 0x23ed91fa, 0xffffffff, 0x5, 0x6, 0x1, 0x0, 0x0, 0x8000, 0x0, 0x3f}, 0xffffffffffffffff, 0xc, r3, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000240)=0xc9da) syz_io_uring_setup(0x6cf4, &(0x7f00000000c0)={0x0, 0x5d97, 0x0, 0x3, 0xcf, 0x0, r3}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000140), &(0x7f0000000180)) openat(r3, &(0x7f0000000200)='./file0\x00', 0x1c4c0, 0x104) 23:07:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x900000000000000) 23:07:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x606a82, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200000, 0x1a) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) signalfd4(r2, &(0x7f00000000c0)={[0x3071554e]}, 0x8, 0x80800) [ 2596.626806] loop3: detected capacity change from 0 to 135266304 [ 2596.632622] tmpfs: Bad value for 'mpol' 23:07:14 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c"], 0x1c}}, 0x0) 23:07:33 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf00000000000000) 23:07:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042", 0xdc, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:07:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 32) [ 2615.697544] FAULT_INJECTION: forcing a failure. [ 2615.697544] name failslab, interval 1, probability 0, space 0, times 0 [ 2615.699970] CPU: 0 PID: 12337 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2615.701443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2615.703211] Call Trace: [ 2615.703779] dump_stack+0x107/0x167 [ 2615.704558] should_fail.cold+0x5/0xa [ 2615.705374] ? p9_fd_create+0x161/0x4a0 [ 2615.706228] should_failslab+0x5/0x20 [ 2615.707055] kmem_cache_alloc_trace+0x55/0x320 [ 2615.708033] p9_fd_create+0x161/0x4a0 [ 2615.708857] ? p9_conn_create+0x510/0x510 [ 2615.709734] ? p9_client_create+0x798/0x1230 [ 2615.710700] ? kfree+0xd7/0x340 [ 2615.711426] ? do_raw_spin_unlock+0x4f/0x220 [ 2615.712363] p9_client_create+0x7ff/0x1230 [ 2615.713296] ? p9_client_flush+0x430/0x430 [ 2615.714200] ? trace_hardirqs_on+0x5b/0x180 [ 2615.715127] ? lockdep_init_map_type+0x2c7/0x780 [ 2615.716135] ? __raw_spin_lock_init+0x36/0x110 [ 2615.717124] v9fs_session_init+0x1dd/0x1680 [ 2615.718038] ? lock_release+0x680/0x680 [ 2615.718901] ? kmem_cache_alloc_trace+0x151/0x320 [ 2615.719920] ? v9fs_show_options+0x690/0x690 [ 2615.720874] ? trace_hardirqs_on+0x5b/0x180 [ 2615.721793] ? kasan_unpoison_shadow+0x33/0x50 [ 2615.722749] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2615.723846] v9fs_mount+0x79/0x8f0 [ 2615.724605] ? v9fs_write_inode+0x60/0x60 [ 2615.725481] legacy_get_tree+0x105/0x220 [ 2615.726406] vfs_get_tree+0x8e/0x300 [ 2615.727214] path_mount+0x1429/0x2120 [ 2615.728032] ? strncpy_from_user+0x9e/0x470 [ 2615.728987] ? finish_automount+0xa90/0xa90 [ 2615.729897] ? getname_flags.part.0+0x1dd/0x4f0 [ 2615.730899] ? _copy_from_user+0xfb/0x1b0 [ 2615.731789] __x64_sys_mount+0x282/0x300 [ 2615.732655] ? copy_mnt_ns+0xa00/0xa00 [ 2615.733487] do_syscall_64+0x33/0x40 [ 2615.734277] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2615.735377] RIP: 0033:0x7ff784b43b19 [ 2615.736170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2615.740110] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2615.741735] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2615.743269] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2615.744809] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2615.746309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2615.748142] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:07:33 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c"], 0x1c}}, 0x0) 23:07:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',version=9p2000,access=any,version=9p2000,cachetag=trans=fd,,dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',access=any,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="6c6f6f7365ac636163608f9f5b1c4f441368653d6e6fee652c63616368653d6c6f6f73652c"]) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:07:33 executing program 0: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000001040)="47d7d45c9a0ee5bce3a1dbf70183e4adf93f480953", 0x15) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001080), 0x200040, 0x0) clock_gettime(0x0, &(0x7f00000039c0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000003840)=[{{&(0x7f00000010c0)=@abs, 0x6e, &(0x7f0000001500)=[{&(0x7f0000001140)=""/97, 0x61}, {&(0x7f00000011c0)=""/101, 0x65}, {&(0x7f0000001240)=""/172, 0xac}, {&(0x7f0000001300)=""/244, 0xf4}, {&(0x7f0000001400)=""/198, 0xc6}], 0x5}}, {{&(0x7f0000001580)=@abs, 0x6e, &(0x7f0000001800)=[{&(0x7f0000001600)=""/69, 0x45}, {&(0x7f0000001680)=""/23, 0x17}, {&(0x7f00000016c0)=""/59, 0x3b}, {&(0x7f0000001700)=""/186, 0xba}, {&(0x7f00000017c0)=""/38, 0x26}], 0x5, &(0x7f0000001880)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf8}}, {{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000001980)=""/171, 0xab}, {&(0x7f0000001a40)=""/14, 0xe}], 0x2, &(0x7f0000001ac0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xf0}}, {{&(0x7f0000001bc0), 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001c40)=""/156, 0x9c}, {&(0x7f0000001e00)=""/161, 0xa1}, {&(0x7f0000001ec0)=""/144, 0x90}], 0x3, &(0x7f0000001d40)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000001f80)=""/188, 0xbc}, {&(0x7f0000002040)=""/129, 0x81}, {&(0x7f0000002100)=""/138, 0x8a}, {&(0x7f00000021c0)=""/246, 0xf6}], 0x4, &(0x7f0000002300)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x100}}, {{0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000002400)=""/232, 0xe8}, {&(0x7f0000002500)=""/64, 0x40}, {&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000003540)=""/185, 0xb9}, {&(0x7f0000003600)=""/166, 0xa6}], 0x5, &(0x7f0000003740)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf0}}], 0x6, 0x1, &(0x7f0000003a00)={r2, r3+60000000}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000003a40)={{0x1, 0x1, 0x18, r0, {r4, 0xee01}}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x401, 0xfff, 0x0, 0x800, 0x1, 0x4, 0xffffffff, 0x40, 0x3, 0xfff, 0x1f, 0x7f, 0x1, 0xfa}}) chdir(0x0) 23:07:33 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x0, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:07:33 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @initdev}}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/129, 0x81}, {&(0x7f0000000180)=""/12, 0xc}], 0x2, &(0x7f0000000200)=""/43, 0x2b}, 0x40010020) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000280)={0xa1ea, 0x6, 0x4a67, 0x9, 0x9, 0xff73}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) [ 2615.782938] loop3: detected capacity change from 0 to 135266304 23:07:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070517a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f79fb77689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0b7e48d66203f38287876724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a27ffd74255ef37a"], 0x420800) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000100)=0x2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2d06fe6b709b5f22f28d2849606ac36fc7139668"]) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="b801881ba497c63a598a91046fe766c67a5ef723e212c65aa83d049a40f58ab7280a5e1338a28f4b0d14"]) r4 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x0, 0x20, 0x20, 0x0, 0x0, 0x6, 0x21b0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x5}, 0x100, 0xffff, 0x6499b7c, 0x6, 0x2, 0x6, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r4, 0x8, 0xffffffffffffffff, 0x3) chdir(0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @fixed}, &(0x7f00000000c0)=0xe, 0x80000) [ 2615.849917] tmpfs: Bad value for 'mpol' 23:07:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0/../file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x6}}]}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:07:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 33) 23:07:34 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x6000000000000000) 23:07:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000200)='./file0/../file0\x00', 0x1) r0 = syz_io_uring_complete(0x0) getdents64(r0, &(0x7f0000000040), 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r1, 0x0) r3 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) syz_mount_image$nfs4(&(0x7f0000000240), &(0x7f00000002c0)='./file0/../file0\x00', 0x40, 0x3, &(0x7f00000006c0)=[{&(0x7f0000000500)="9459eabcc446af3d37c7d1c524f8d0c388e91e728018c00df51871a8b921d0b8c544af70386caf575051c23d856638b697444fd54af2928d5fe406765cbac8fe18ff3169abef8d948a947ae7e893ed215691eb375f69b9e081ea9b626c970d75848d4f95e3e91bb654b175168042bb5e33730af566ffdb9bea0ee395a942ae4b17add2d2ffa13b8b598f734b76cd57b960d31512523afb2173abc9f51a7ee54d5a", 0xa1, 0x8}, {&(0x7f0000000300)="79dd939eb71ec13ee8225598ec409f5ced3016da0edecfd140", 0x19, 0xef}, {&(0x7f00000005c0)="462a275f94489366fc1c0122a5260a4c5c46ded9fcce976993c5954399c47aeb625e85ada9a2b382228eb2b6ae237c5c56896ecb17ad545544e8a93a350c85dbc9bfc1fb2369d5a8a4a0effff7599dde54a7415c04c5abd31102ed018b9349140f50a2642537126a3493ea1ef16e98687ce69bde5aa2fe27aea78b48d2c23fd0978823e606574588f21314adfdc72fb2205d1b05f6d63811c61eb38fb95503a93b4c92d82a0709bfca5a24180e16ba8126e907c6da906f03795bad3ba47a95aaae39af78755a2b08a60032c037404e7fa381f59fc44cf120faf54ecfba222d6d9720168e518106f3b49f929e15a5652b232d463fb7", 0xf5, 0x200}], 0x8000, &(0x7f0000000880)={[{'\'['}, {}, {'#*@'}, {'9p\x00'}], [{@fowner_gt={'fowner>', 0xee00}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@euid_gt={'euid>', r4}}, {@subj_type={'subj_type', 0x3d, '#%^){\xc8%)]H(/'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fowner_gt={'fowner>', r5}}, {@subj_type={'subj_type', 0x3d, '*('}}]}) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r6, &(0x7f0000001e00)=""/4100, 0x1004) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r7, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) fspick(r8, &(0x7f0000000000)='./file0\x00', 0x1) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x108, 0x2, 0x1, 0x3, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_LABELS_MASK={0x10, 0x17, [0xfc1b, 0x0, 0x1]}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xfffffffc}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x3}]}, @CTA_TUPLE_REPLY={0x90, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x4}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xfffffffc}, @CTA_LABELS={0x14, 0x16, 0x1, 0x0, [0x6, 0x0, 0x4, 0x62]}, @CTA_LABELS_MASK={0x14, 0x17, [0x80000, 0x4d, 0x7, 0x6]}]}, 0x108}, 0x1, 0x0, 0x0, 0x40081}, 0x40400c5) 23:07:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x10000, 0x98, 0xfffffffffffff801, 0x1, 0x9, 0x9}) chdir(0x0) [ 2615.995318] FAULT_INJECTION: forcing a failure. [ 2615.995318] name failslab, interval 1, probability 0, space 0, times 0 [ 2615.997692] CPU: 1 PID: 12368 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2615.999066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2616.000725] Call Trace: [ 2616.001248] dump_stack+0x107/0x167 [ 2616.001971] should_fail.cold+0x5/0xa [ 2616.002724] ? create_object.isra.0+0x3a/0xa20 [ 2616.003623] should_failslab+0x5/0x20 [ 2616.004379] kmem_cache_alloc+0x5b/0x310 [ 2616.005194] ? p9_fd_show_options+0x1c0/0x1c0 [ 2616.006080] create_object.isra.0+0x3a/0xa20 [ 2616.006941] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2616.007939] kmem_cache_alloc_trace+0x151/0x320 [ 2616.008858] p9_fd_create+0x161/0x4a0 [ 2616.009611] ? p9_conn_create+0x510/0x510 [ 2616.010424] ? p9_client_create+0x798/0x1230 [ 2616.011289] ? kfree+0xd7/0x340 [ 2616.011934] ? do_raw_spin_unlock+0x4f/0x220 [ 2616.012823] p9_client_create+0x7ff/0x1230 [ 2616.013660] ? p9_client_flush+0x430/0x430 [ 2616.014490] ? trace_hardirqs_on+0x5b/0x180 [ 2616.015343] ? lockdep_init_map_type+0x2c7/0x780 [ 2616.016286] ? __raw_spin_lock_init+0x36/0x110 [ 2616.017202] v9fs_session_init+0x1dd/0x1680 [ 2616.018057] ? lock_release+0x680/0x680 [ 2616.018859] ? kmem_cache_alloc_trace+0x151/0x320 [ 2616.019812] ? v9fs_show_options+0x690/0x690 [ 2616.020696] ? trace_hardirqs_on+0x5b/0x180 [ 2616.021535] ? kasan_unpoison_shadow+0x33/0x50 [ 2616.022441] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2616.023441] v9fs_mount+0x79/0x8f0 [ 2616.024135] ? v9fs_write_inode+0x60/0x60 [ 2616.024952] legacy_get_tree+0x105/0x220 [ 2616.025743] vfs_get_tree+0x8e/0x300 [ 2616.026463] path_mount+0x1429/0x2120 [ 2616.027210] ? strncpy_from_user+0x9e/0x470 [ 2616.028044] ? finish_automount+0xa90/0xa90 [ 2616.028899] ? getname_flags.part.0+0x1dd/0x4f0 [ 2616.029807] ? _copy_from_user+0xfb/0x1b0 [ 2616.030632] __x64_sys_mount+0x282/0x300 [ 2616.031424] ? copy_mnt_ns+0xa00/0xa00 [ 2616.032195] do_syscall_64+0x33/0x40 [ 2616.033009] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2616.034017] RIP: 0033:0x7ff784b43b19 [ 2616.034747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2616.038324] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2616.039802] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2616.041194] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2616.042575] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2616.043959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2616.045349] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2632.580434] 9pnet: Insufficient options for proto=fd [ 2632.589306] 9pnet: Insufficient options for proto=fd [ 2632.596563] FAULT_INJECTION: forcing a failure. [ 2632.596563] name failslab, interval 1, probability 0, space 0, times 0 [ 2632.599494] CPU: 0 PID: 12385 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2632.601248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2632.603387] Call Trace: [ 2632.604058] dump_stack+0x107/0x167 [ 2632.604979] should_fail.cold+0x5/0xa [ 2632.605937] ? p9_client_prepare_req.part.0+0x3a/0xac0 [ 2632.607125] should_failslab+0x5/0x20 [ 2632.607992] kmem_cache_alloc+0x5b/0x310 [ 2632.608908] p9_client_prepare_req.part.0+0x3a/0xac0 [ 2632.610113] p9_client_rpc+0x220/0x1370 [ 2632.611004] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2632.612177] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2632.613378] ? pipe_poll+0x21b/0x800 [ 2632.614251] ? p9_fd_close+0x4a0/0x4a0 [ 2632.615117] ? wait_for_partner+0x3c0/0x3c0 [ 2632.616077] ? p9_fd_poll+0x1e0/0x2c0 [ 2632.616930] ? p9_fd_create+0x357/0x4a0 [ 2632.617906] ? p9_conn_create+0x510/0x510 [ 2632.618837] ? p9_client_create+0x798/0x1230 [ 2632.619820] ? kfree+0xd7/0x340 [ 2632.620552] ? do_raw_spin_unlock+0x4f/0x220 [ 2632.621573] p9_client_create+0xa76/0x1230 [ 2632.622562] ? p9_client_flush+0x430/0x430 [ 2632.623508] ? trace_hardirqs_on+0x5b/0x180 [ 2632.624471] ? lockdep_init_map_type+0x2c7/0x780 [ 2632.625558] ? __raw_spin_lock_init+0x36/0x110 [ 2632.626622] v9fs_session_init+0x1dd/0x1680 [ 2632.627589] ? lock_release+0x680/0x680 [ 2632.628483] ? kmem_cache_alloc_trace+0x151/0x320 [ 2632.629583] ? v9fs_show_options+0x690/0x690 [ 2632.630600] ? trace_hardirqs_on+0x5b/0x180 [ 2632.631565] ? kasan_unpoison_shadow+0x33/0x50 [ 2632.632573] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2632.633762] v9fs_mount+0x79/0x8f0 [ 2632.634626] ? v9fs_write_inode+0x60/0x60 [ 2632.635556] legacy_get_tree+0x105/0x220 [ 2632.636465] vfs_get_tree+0x8e/0x300 [ 2632.637307] path_mount+0x1429/0x2120 [ 2632.638213] ? strncpy_from_user+0x9e/0x470 [ 2632.639178] ? finish_automount+0xa90/0xa90 [ 2632.640146] ? getname_flags.part.0+0x1dd/0x4f0 [ 2632.641201] ? _copy_from_user+0xfb/0x1b0 [ 2632.642179] __x64_sys_mount+0x282/0x300 [ 2632.643083] ? copy_mnt_ns+0xa00/0xa00 [ 2632.643961] do_syscall_64+0x33/0x40 [ 2632.644791] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2632.646000] RIP: 0033:0x7ff784b43b19 [ 2632.646838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2632.651008] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2632.652713] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2632.654361] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2632.655949] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2632.657560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2632.659221] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:07:50 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x9900000000000000) 23:07:50 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x0, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:07:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 34) 23:07:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc7", 0xe3, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:07:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:07:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = epoll_create1(0x80000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x0) 23:07:50 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c"], 0x1c}}, 0x0) 23:07:50 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) getdents64(r0, &(0x7f0000000000)=""/2, 0x2) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) getdents64(r2, &(0x7f00000000c0)=""/252, 0xfc) getdents64(r0, &(0x7f0000000380)=""/4096, 0x1000) 23:07:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) getdents(r0, &(0x7f0000000100)=""/87, 0x57) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) accept4(r2, 0x0, &(0x7f0000000200), 0x0) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:07:51 executing program 0: chdir(0x0) [ 2632.775517] loop3: detected capacity change from 0 to 135266304 23:07:51 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x9effffff00000000) 23:07:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) r1 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x40, 0x5, &(0x7f0000000280)=[{&(0x7f00000000c0)="c08e31e6d92a116b6046", 0xa, 0x5}, {&(0x7f0000000100)="1f9a92e3e2a1f7b84eb4769e0367ed418776255440bc1caa7e46ed910d14715a9a0426d00131d2684f9041ead20b3ccc9c7d99e241ce424d64f161cbc831790def50583a95e5b418d2a97a0b4027e2ac3e98f9ada9aae5c6c917de185283a0403b30b6903bf7692da01b34488512b325aaeb86ae2bc5d7ae044b4bef1877e0438f93f6", 0x83, 0xc5e2}, {&(0x7f0000000380)="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", 0x1000, 0x32}, {&(0x7f00000001c0)="61ca64fbdc12bee4eec867789badcb1afd1575d184fa188637c08585c9e57ec66ef83b8ed9ebca8ada", 0x29, 0x9}, {&(0x7f0000000200)="1bd738f27f58fcb274d34ed3a185d93eb0c8a900c8e250c382a22398f2540dfd4e613323b974c8cad3375460324efce173fb32a6d544a0164dbe1449afbb6b2fc3f4c1fb0ac24164d9c490b3965563e07452efd6fc", 0x55, 0x1}], 0x1000, &(0x7f0000001380)=ANY=[@ANYBLOB="27da272e2f242529632125242c2c2c66756e633d4b455845435f4b45524e454c5f080000004b2c736d61636b6673726f6f743d292c657569643e", @ANYRESDEC, @ANYBLOB=',\x00']) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(r0, &(0x7f0000001480)=""/232, 0xe8) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) openat(r1, &(0x7f0000001440)='./file0/../file0\x00', 0x8000, 0x8c) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) move_mount(r1, &(0x7f0000000300)='./file0\x00', r3, &(0x7f0000001400)='./file0\x00', 0x21) [ 2632.792391] tmpfs: Bad value for 'mpol' 23:07:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 35) [ 2632.903704] loop4: detected capacity change from 0 to 100864 23:07:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r1 = getpid() r2 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, r2) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) dup3(r4, r3, 0x80000) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3f, 0x7f, 0x6, 0x3b, 0x0, 0x800, 0x20081, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xe26a}, 0x10, 0x1, 0x2, 0x8, 0x20, 0x81, 0x3, 0x0, 0x7a, 0x0, 0x2}, r1, 0x9, r0, 0x3) tkill(0xffffffffffffffff, 0x3a) 23:07:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc7", 0xe3, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:07:51 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a6"], 0x1c}}, 0x0) [ 2632.997899] FAULT_INJECTION: forcing a failure. [ 2632.997899] name failslab, interval 1, probability 0, space 0, times 0 [ 2633.000605] CPU: 0 PID: 12421 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2633.002186] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2633.004045] Call Trace: [ 2633.004642] dump_stack+0x107/0x167 [ 2633.005477] should_fail.cold+0x5/0xa [ 2633.006340] ? create_object.isra.0+0x3a/0xa20 [ 2633.007372] should_failslab+0x5/0x20 [ 2633.008230] kmem_cache_alloc+0x5b/0x310 [ 2633.009168] create_object.isra.0+0x3a/0xa20 [ 2633.010158] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2633.011306] kmem_cache_alloc+0x159/0x310 [ 2633.012250] p9_client_prepare_req.part.0+0x3a/0xac0 [ 2633.013413] p9_client_rpc+0x220/0x1370 [ 2633.014312] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2633.015552] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2633.016799] ? pipe_poll+0x21b/0x800 [ 2633.017656] ? p9_fd_close+0x4a0/0x4a0 [ 2633.018531] ? wait_for_partner+0x3c0/0x3c0 [ 2633.019556] ? p9_fd_poll+0x1e0/0x2c0 [ 2633.020508] ? p9_fd_create+0x357/0x4a0 [ 2633.021424] ? p9_conn_create+0x510/0x510 [ 2633.022357] ? p9_client_create+0x798/0x1230 [ 2633.023422] ? kfree+0xd7/0x340 [ 2633.024176] ? do_raw_spin_unlock+0x4f/0x220 [ 2633.025187] p9_client_create+0xa76/0x1230 [ 2633.026153] ? p9_client_flush+0x430/0x430 [ 2633.027110] ? trace_hardirqs_on+0x5b/0x180 [ 2633.028080] ? lockdep_init_map_type+0x2c7/0x780 [ 2633.029161] ? __raw_spin_lock_init+0x36/0x110 [ 2633.030202] v9fs_session_init+0x1dd/0x1680 [ 2633.031173] ? lock_release+0x680/0x680 [ 2633.032074] ? kmem_cache_alloc_trace+0x151/0x320 [ 2633.033167] ? v9fs_show_options+0x690/0x690 [ 2633.034165] ? trace_hardirqs_on+0x5b/0x180 [ 2633.035133] ? kasan_unpoison_shadow+0x33/0x50 [ 2633.036159] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2633.037317] v9fs_mount+0x79/0x8f0 [ 2633.038153] ? v9fs_write_inode+0x60/0x60 [ 2633.039089] legacy_get_tree+0x105/0x220 [ 2633.040004] vfs_get_tree+0x8e/0x300 [ 2633.040847] path_mount+0x1429/0x2120 [ 2633.041722] ? strncpy_from_user+0x9e/0x470 [ 2633.042702] ? finish_automount+0xa90/0xa90 [ 2633.043669] ? getname_flags.part.0+0x1dd/0x4f0 [ 2633.044715] ? _copy_from_user+0xfb/0x1b0 [ 2633.045672] __x64_sys_mount+0x282/0x300 [ 2633.046585] ? copy_mnt_ns+0xa00/0xa00 [ 2633.047473] do_syscall_64+0x33/0x40 [ 2633.048312] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2633.049479] RIP: 0033:0x7ff784b43b19 [ 2633.050359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2633.054563] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2633.056286] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2633.057906] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2633.059508] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2633.061130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2633.062732] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:07:51 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xf0ffffff00000000) [ 2633.136674] loop3: detected capacity change from 0 to 135266304 [ 2633.147674] tmpfs: Bad value for 'mpol' [ 2633.234269] loop4: detected capacity change from 0 to 100864 23:08:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc7", 0xe3, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:08:07 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xfd, 0x6, 0x7, 0x1, 0x0, 0x1, 0x840, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x7, 0x3ff}, 0x300, 0x3c2, 0xbbb, 0xc9e66e0009c32d35, 0x1, 0xffffffff, 0x3, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xf, r0, 0x2) 23:08:07 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:08:07 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d66642c777b232d6ed2", @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',\x00']) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0xa8) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trals=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="cd6dcbf2c762e8abb91a00d47776f385253bc9d7581e3cd78692f5ea8e7618ed44751056ba0f9a2e096642eed1ee4f11cb0915d2fba5956f64c4db506cb01b08d40619e74618431ff16d982e6bac3c967245dc114511c1367149ee60467022dab62468a608e1ec0108ea62d3331fe703e441a962878fabd78b1c471cbf1e67a356b4488d46e1763026fb130f911b268ba920f0df48f3d79b69fb26b578d22a7b17f587d93b04b1"]) fcntl$setstatus(r1, 0x4, 0x4000) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080), 0x0, 0x1}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r7, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="1c156ca7ca9f817472006e733d66642c7266646e6f3d", @ANYRES32, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB=',\x00']) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r9, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000200)="7a701a7ccde70a", 0x7}, {&(0x7f0000000240)="9131d73482c46134e625b20c10720f867426a49b22440eb3c436ac8cd32126d1424b71ebd8f7d6cd8e70", 0x2a}, {&(0x7f00000002c0)}, {&(0x7f00000004c0)="232f8e58bbf32991d75ffac091f74d40fa2692bbe6345ae022aa7f5b62c05810882418ae070447828f5d697723c59aca2cbd68381b57efb056228fc32b9f7d6e1d3fb853cdb87a91a35523c6ab9e92b4046ed4dd4d7b5495fc0d9dd54ec0c8b660c21222787c334cd4268f0ccb65c1d762c89e923c97b3a926efbcd500509337aae2268f19c891935be7975c2eefb147f60ace734b2f9a686fae3ebad32ff91514838086563b4e14d26f45ee9610fc14cb794ae7d984f99a7142eb92c73d5101a13bf1636ab3f8160d8e4d7b0f032e50f3874e1fe215", 0xd6}, {&(0x7f00000005c0)="2cc3f17fe754169711b57fba5c75c0a6a2e323ce2b402ae3636a6e1c11d3d7ec08beac3e2a988b99a7cde558e88b850b4bf2838a5d1611fc215e0176c5fb7a6579522e195c57f2542000a4352b3bdaddbbb6fcf2417a02642a630040d53d99935623f44f4c00cd4225dbdb75677deb6abe18e9e7806351f7538f224bcd9bfe19319e82d832e543bbb81690930ae1dbde088ab4c357c52d5ed8f1b81e885c836a99f7f0227cbdbffe66d599241a39b30d374eb547361f7412", 0xb8}, {&(0x7f0000000680)="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", 0x1000}], 0x6, &(0x7f0000004f00)=[@rights={{0x28, 0x1, 0x1, [r0, r1, r2, r1, r4, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, r5, r1, r7, r10]}}], 0xf0, 0x1}, 0x4000090) 23:08:07 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc, 0x1010, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:08:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 36) 23:08:07 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a6"], 0x1c}}, 0x0) 23:08:07 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xfcffffff00000000) [ 2649.481142] FAULT_INJECTION: forcing a failure. [ 2649.481142] name failslab, interval 1, probability 0, space 0, times 0 [ 2649.483666] CPU: 0 PID: 12459 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2649.485175] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2649.487003] Call Trace: [ 2649.487032] dump_stack+0x107/0x167 [ 2649.487057] should_fail.cold+0x5/0xa [ 2649.487089] ? p9_fcall_init+0x97/0x290 [ 2649.490035] should_failslab+0x5/0x20 [ 2649.490856] __kmalloc+0x72/0x390 [ 2649.491609] p9_fcall_init+0x97/0x290 [ 2649.492437] p9_client_prepare_req.part.0+0x8c/0xac0 [ 2649.493524] p9_client_rpc+0x220/0x1370 [ 2649.494398] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2649.495530] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2649.496676] ? pipe_poll+0x21b/0x800 [ 2649.497465] ? p9_fd_close+0x4a0/0x4a0 [ 2649.498316] ? wait_for_partner+0x3c0/0x3c0 [ 2649.499244] ? p9_fd_poll+0x1e0/0x2c0 [ 2649.500064] ? p9_fd_create+0x357/0x4a0 [ 2649.500920] ? p9_conn_create+0x510/0x510 [ 2649.501843] ? p9_client_create+0x798/0x1230 [ 2649.502770] ? kfree+0xd7/0x340 [ 2649.503464] ? do_raw_spin_unlock+0x4f/0x220 [ 2649.504400] p9_client_create+0xa76/0x1230 [ 2649.505302] ? p9_client_flush+0x430/0x430 [ 2649.506224] ? trace_hardirqs_on+0x5b/0x180 [ 2649.507139] ? lockdep_init_map_type+0x2c7/0x780 [ 2649.508157] ? __raw_spin_lock_init+0x36/0x110 [ 2649.509135] v9fs_session_init+0x1dd/0x1680 [ 2649.510078] ? lock_release+0x680/0x680 [ 2649.510922] ? kmem_cache_alloc_trace+0x151/0x320 [ 2649.511934] ? v9fs_show_options+0x690/0x690 [ 2649.512892] ? trace_hardirqs_on+0x5b/0x180 [ 2649.513832] ? kasan_unpoison_shadow+0x33/0x50 [ 2649.514809] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2649.515896] v9fs_mount+0x79/0x8f0 [ 2649.516657] ? v9fs_write_inode+0x60/0x60 [ 2649.517545] legacy_get_tree+0x105/0x220 [ 2649.518472] vfs_get_tree+0x8e/0x300 [ 2649.519271] path_mount+0x1429/0x2120 [ 2649.520093] ? strncpy_from_user+0x9e/0x470 [ 2649.521016] ? finish_automount+0xa90/0xa90 [ 2649.521980] ? getname_flags.part.0+0x1dd/0x4f0 [ 2649.522981] ? _copy_from_user+0xfb/0x1b0 [ 2649.523879] __x64_sys_mount+0x282/0x300 [ 2649.524748] ? copy_mnt_ns+0xa00/0xa00 [ 2649.525594] do_syscall_64+0x33/0x40 [ 2649.526430] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2649.527525] RIP: 0033:0x7ff784b43b19 [ 2649.528324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2649.532311] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2649.533978] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2649.535514] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2649.537092] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2649.538652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2649.540189] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:08:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x7f, 0x0, 0xa0, 0x5, 0x0, 0x6, 0x94410, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x4}, 0x802, 0x2, 0x528, 0x9, 0x6, 0xfffffffe, 0x4c, 0x0, 0x9, 0x0, 0x6305328e}, 0xffffffffffffffff, 0x5, r1, 0x2) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x5f94c1, 0x64) truncate(&(0x7f0000000100)='./file0\x00', 0x1) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) 23:08:07 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$FICLONE(r0, 0x40049409, r1) chdir(0x0) 23:08:07 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xffffff7f00000000) [ 2649.635329] loop3: detected capacity change from 0 to 135266304 [ 2649.663839] tmpfs: Bad value for 'mpol' 23:08:08 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a6"], 0x1c}}, 0x0) 23:08:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 37) 23:08:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246", 0xe7, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2649.824610] FAULT_INJECTION: forcing a failure. [ 2649.824610] name failslab, interval 1, probability 0, space 0, times 0 [ 2649.826415] CPU: 1 PID: 12489 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2649.827846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2649.829268] Call Trace: [ 2649.829736] dump_stack+0x107/0x167 [ 2649.830348] should_fail.cold+0x5/0xa [ 2649.831003] ? create_object.isra.0+0x3a/0xa20 [ 2649.831771] should_failslab+0x5/0x20 [ 2649.832422] kmem_cache_alloc+0x5b/0x310 [ 2649.833101] create_object.isra.0+0x3a/0xa20 [ 2649.833855] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2649.834712] __kmalloc+0x16e/0x390 [ 2649.835323] p9_fcall_init+0x97/0x290 [ 2649.835967] p9_client_prepare_req.part.0+0x8c/0xac0 [ 2649.836814] p9_client_rpc+0x220/0x1370 [ 2649.837496] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2649.838394] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2649.839301] ? pipe_poll+0x21b/0x800 [ 2649.839917] ? p9_fd_close+0x4a0/0x4a0 [ 2649.840565] ? wait_for_partner+0x3c0/0x3c0 [ 2649.841290] ? p9_fd_poll+0x1e0/0x2c0 [ 2649.841944] ? p9_fd_create+0x357/0x4a0 [ 2649.842607] ? p9_conn_create+0x510/0x510 [ 2649.843312] ? p9_client_create+0x798/0x1230 [ 2649.844045] ? kfree+0xd7/0x340 [ 2649.844596] ? do_raw_spin_unlock+0x4f/0x220 [ 2649.845331] p9_client_create+0xa76/0x1230 [ 2649.846054] ? p9_client_flush+0x430/0x430 [ 2649.846754] ? trace_hardirqs_on+0x5b/0x180 [ 2649.847477] ? lockdep_init_map_type+0x2c7/0x780 [ 2649.848284] ? __raw_spin_lock_init+0x36/0x110 [ 2649.849048] v9fs_session_init+0x1dd/0x1680 [ 2649.849786] ? lock_release+0x680/0x680 [ 2649.850462] ? kmem_cache_alloc_trace+0x151/0x320 [ 2649.851278] ? v9fs_show_options+0x690/0x690 [ 2649.852012] ? trace_hardirqs_on+0x5b/0x180 [ 2649.852737] ? kasan_unpoison_shadow+0x33/0x50 [ 2649.853497] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2649.854349] v9fs_mount+0x79/0x8f0 [ 2649.854936] ? v9fs_write_inode+0x60/0x60 [ 2649.855631] legacy_get_tree+0x105/0x220 [ 2649.856347] vfs_get_tree+0x8e/0x300 [ 2649.856968] path_mount+0x1429/0x2120 [ 2649.857600] ? strncpy_from_user+0x9e/0x470 [ 2649.858325] ? finish_automount+0xa90/0xa90 [ 2649.859044] ? getname_flags.part.0+0x1dd/0x4f0 [ 2649.859823] ? _copy_from_user+0xfb/0x1b0 [ 2649.860522] __x64_sys_mount+0x282/0x300 [ 2649.861197] ? copy_mnt_ns+0xa00/0xa00 [ 2649.861837] do_syscall_64+0x33/0x40 [ 2649.862314] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2649.862966] RIP: 0033:0x7ff784b43b19 [ 2649.863439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2649.865768] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2649.866731] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2649.867623] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2649.868523] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2649.869414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2649.870312] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:08:08 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x62e3, &(0x7f0000000000)={0x0, 0xf224, 0x1, 0x2, 0x380}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="0010"]) open(&(0x7f0000000140)='./file0\x00', 0x40002, 0x50) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r5, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) syz_io_uring_submit(r2, 0x0, &(0x7f0000000240)=@IORING_OP_POLL_REMOVE={0x7, 0x4}, 0xfffffffa) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r7, 0xffffffffffffffff, 0x0) open_by_handle_at(r7, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070517a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f79fb77689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0b7e48d66203f38287876724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a27ffd74255ef37a"], 0x420800) fcntl$setflags(r7, 0x2, 0x0) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r8, &(0x7f0000001e00)=""/4100, 0x1004) 23:08:08 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a60000"], 0x1c}}, 0x0) 23:08:08 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0xfffffffffffff000) [ 2649.984486] 9pnet: Insufficient options for proto=fd [ 2650.005796] loop3: detected capacity change from 0 to 135266304 [ 2650.008150] tmpfs: Bad value for 'mpol' 23:08:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 38) 23:08:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:08:24 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) statx(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f00000005c0)=0xe8) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f00000000c0)="49840b17b7a80d458cd5fc0b2c16a0e3a88bfcf31a56b5d720255eea75a04a7fbc91ec89b4f246478bfdd4db3770d91975a254c11db769691d33404f458f5189a5de8d03ce6522d54e02486c255e46f67db785d520161882cbb9f220ef160a8ee7350be45ec8999f1eba3a964c75e0428460bcf743bf2d00896d91791936119fdd5881bfdf262e681d401cc89630b9cb279570dd756c2dc16ea0c34a0d7af9a8b3e53001751741a998159a079b35ff98695a397fd1467789d3944273", 0xbc, 0x1}, {&(0x7f0000000180)="40e58dbe96c9d8eeee709d272fb5ac5f0f7f1f1a73a2a49dd58cacc15ba552f90c5449a6cb6739aaf6345285ee72890c2bee404684f95dae8fbd04f29e8bbe0c1f90559be414e983df8622a6a3c7f5bd53568a08e30b0dd1e36daa680b5190b563ee6a5cbc7a7f6deb3b6a853bdabeb36eb85c06a2f463b579c04aac629fe06c5da913812934947790fc81492e1f", 0x8e, 0x7fffffff}], 0x200000, &(0x7f0000000700)=ANY=[@ANYBLOB="3a3a2c865d3a7be32c2e5c5b5d6c2e2f2c2c646f6e745f686173682c61707072616973655f747970653d696d617369672c7569643e", @ANYRESDEC=r2, @ANYBLOB="2c7375626a5f757365723d2923252c646f6e745f6d6561737572652c61707072616973652c7569643ef3ce76d2adf33e92b32aa42a815c9b9efe5f088cd23c8388d087d5f0b0fb36d28c3a7197dfdb158849330efabc122be0bc66d1c2fde6f19e60595760bdb708c89fc0040dd881cafc0c", @ANYRESDEC=r3, @ANYBLOB=',smackfshat=%\\[%{$$\\+,\x00']) 23:08:24 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2666.504513] loop4: detected capacity change from 0 to 135266304 [ 2666.506630] nfs4: Unknown parameter '::' 23:08:24 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000180)={0x1, 0x0, 0x1000, 0x6b, &(0x7f0000000040)="385cfee6ceb8a939a4a7dc578cb7be9d0839bb5fd782db3fee483890163ad0b9b33e34338ac66ae7b2c625d6cab435f782df5258a4311a18bca69581735a421eac62968720197478159e0840d9f8c78d7f6af73c2f05a398390d27c95aa346e81b91f9f1e962be70388e58", 0x73, 0x0, &(0x7f0000000100)="bea7c4335082cb9cc5acd35dd60dcae786e8b79b3b4aa87aac921e759b51b114a08287f87e37287bcb2ef5f720027484a53cdac628e1ba828c5ab93331d3ab9ca7fd3aa8763b3a947ca54e83617031fbba6e5d56201442eacae9d61ee8759b83e9dd9dc64c00e86c2d7473e30bc959ed06b126"}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) 23:08:24 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a60000"], 0x1c}}, 0x0) 23:08:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246", 0xe7, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:08:24 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21e33, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4141}, 0x0, 0xfffffffffffffff9, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7472616e733d6664ed97a97d00005f558a0600000000000000f4eb309c491f672b24ff0a431d0000000000000000000000db43351091e306701a8928f6325e72f6d719a27f2aca9af4b01b8faf3905aa7c9afe13c8b64c6147ec2a58f4750fb9b6aedfe1df764db1edd83fc53cfe57e525e4d315b184888291bf1b9afbef8ac890344b45", @ANYRESHEX=r1, @ANYBLOB=',wf\x00\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',\x00', @ANYRESOCT]) ioctl$F2FS_IOC_GET_FEATURES(r2, 0x8004f50c, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000b80)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x80, "5fabd34a60e47f"}) [ 2666.508592] FAULT_INJECTION: forcing a failure. [ 2666.508592] name failslab, interval 1, probability 0, space 0, times 0 [ 2666.511284] CPU: 1 PID: 12512 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2666.512756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2666.514540] Call Trace: [ 2666.515108] dump_stack+0x107/0x167 [ 2666.515893] should_fail.cold+0x5/0xa [ 2666.516699] ? p9_fcall_init+0x97/0x290 [ 2666.517544] should_failslab+0x5/0x20 [ 2666.518519] __kmalloc+0x72/0x390 [ 2666.519254] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2666.520335] p9_fcall_init+0x97/0x290 [ 2666.521151] p9_client_prepare_req.part.0+0xf4/0xac0 [ 2666.522229] p9_client_rpc+0x220/0x1370 [ 2666.523201] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000535c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000b80)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r21}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x80, "5fabd34a60e47f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000545c0)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x6, "26692452b431f2"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000555c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r28}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r26}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r25}, {}, {}, {}, {0x0, r24}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r27}], 0x0, "46da9200"}) [ 2666.524348] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2666.525765] ? pipe_poll+0x21b/0x800 [ 2666.526559] ? p9_fd_close+0x4a0/0x4a0 [ 2666.527384] ? wait_for_partner+0x3c0/0x3c0 [ 2666.528323] ? p9_fd_poll+0x1e0/0x2c0 ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f00000565c0)={0x20, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {0x0, r13}, {0x0, r22}, {r23}, {r28}], 0x4, "4b41ad83bf26cb"}) fcntl$dupfd(r2, 0x0, r0) chdir(0x0) [ 2666.529369] ? p9_fd_create+0x357/0x4a0 [ 2666.530346] ? p9_conn_create+0x510/0x510 [ 2666.531277] ? p9_client_create+0x798/0x1230 [ 2666.532205] ? kfree+0xd7/0x340 [ 2666.532905] ? do_raw_spin_unlock+0x4f/0x220 [ 2666.533836] p9_client_create+0xa76/0x1230 [ 2666.534724] ? p9_client_flush+0x430/0x430 [ 2666.535600] ? trace_hardirqs_on+0x5b/0x180 [ 2666.536502] ? lockdep_init_map_type+0x2c7/0x780 [ 2666.537503] ? __raw_spin_lock_init+0x36/0x110 [ 2666.538470] v9fs_session_init+0x1dd/0x1680 [ 2666.539379] ? lock_release+0x680/0x680 [ 2666.540221] ? kmem_cache_alloc_trace+0x151/0x320 [ 2666.541229] ? v9fs_show_options+0x690/0x690 [ 2666.542156] ? trace_hardirqs_on+0x5b/0x180 [ 2666.543081] ? kasan_unpoison_shadow+0x33/0x50 [ 2666.544043] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2666.545119] v9fs_mount+0x79/0x8f0 [ 2666.545866] ? v9fs_write_inode+0x60/0x60 [ 2666.546749] legacy_get_tree+0x105/0x220 [ 2666.547604] vfs_get_tree+0x8e/0x300 [ 2666.548385] path_mount+0x1429/0x2120 [ 2666.549189] ? strncpy_from_user+0x9e/0x470 [ 2666.550094] ? finish_automount+0xa90/0xa90 [ 2666.551014] ? getname_flags.part.0+0x1dd/0x4f0 [ 2666.551996] ? _copy_from_user+0xfb/0x1b0 [ 2666.552870] __x64_sys_mount+0x282/0x300 [ 2666.553724] ? copy_mnt_ns+0xa00/0xa00 [ 2666.554578] do_syscall_64+0x33/0x40 [ 2666.555359] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2666.556451] RIP: 0033:0x7ff784b43b19 [ 2666.557250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2666.561163] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2666.562788] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2666.564306] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2666.565837] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2666.567358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2666.568882] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2666.610904] loop4: detected capacity change from 0 to 135266304 [ 2666.612827] nfs4: Unknown parameter '::' 23:08:24 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x29}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6e}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x45}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4a}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x75}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x11}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x49}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 23:08:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) [ 2666.726902] loop3: detected capacity change from 0 to 135266304 [ 2666.732228] tmpfs: Bad value for 'mpol' 23:08:25 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) chdir(0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) futimesat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x0, 0x2710}}) write$P9_RREADLINK(r2, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 23:08:25 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 39) 23:08:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246", 0xe7, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:08:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:08:25 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) signalfd(r1, &(0x7f00000000c0)={[0x92a3]}, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400, 0x140) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x3ff}}, './file0\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(0x0, r4) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') writev(r5, &(0x7f0000000200)=[{&(0x7f0000000040)='3', 0x1}], 0x1) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) [ 2666.918842] FAULT_INJECTION: forcing a failure. [ 2666.918842] name failslab, interval 1, probability 0, space 0, times 0 [ 2666.921324] CPU: 1 PID: 12546 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2666.922706] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2666.924380] Call Trace: [ 2666.924913] dump_stack+0x107/0x167 [ 2666.925646] should_fail.cold+0x5/0xa [ 2666.926426] ? create_object.isra.0+0x3a/0xa20 [ 2666.927413] should_failslab+0x5/0x20 [ 2666.928187] kmem_cache_alloc+0x5b/0x310 [ 2666.929012] create_object.isra.0+0x3a/0xa20 [ 2666.929897] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2666.930939] __kmalloc+0x16e/0x390 [ 2666.931660] p9_fcall_init+0x97/0x290 [ 2666.932432] p9_client_prepare_req.part.0+0xf4/0xac0 [ 2666.933469] p9_client_rpc+0x220/0x1370 [ 2666.934276] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2666.935372] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2666.936455] ? pipe_poll+0x21b/0x800 [ 2666.937381] ? p9_fd_close+0x4a0/0x4a0 [ 2666.938157] ? wait_for_partner+0x3c0/0x3c0 [ 2666.939003] ? p9_fd_poll+0x1e0/0x2c0 [ 2666.939740] ? p9_fd_create+0x357/0x4a0 [ 2666.940506] ? p9_conn_create+0x510/0x510 [ 2666.941302] ? p9_client_create+0x798/0x1230 [ 2666.942151] ? kfree+0xd7/0x340 [ 2666.942790] ? do_raw_spin_unlock+0x4f/0x220 [ 2666.943644] p9_client_create+0xa76/0x1230 [ 2666.944465] ? p9_client_flush+0x430/0x430 [ 2666.945276] ? trace_hardirqs_on+0x5b/0x180 [ 2666.946116] ? lockdep_init_map_type+0x2c7/0x780 [ 2666.947043] ? __raw_spin_lock_init+0x36/0x110 [ 2666.947932] v9fs_session_init+0x1dd/0x1680 [ 2666.948755] ? lock_release+0x680/0x680 [ 2666.949527] ? kmem_cache_alloc_trace+0x151/0x320 [ 2666.950465] ? v9fs_show_options+0x690/0x690 [ 2666.951317] ? trace_hardirqs_on+0x5b/0x180 [ 2666.952161] ? kasan_unpoison_shadow+0x33/0x50 [ 2666.953045] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2666.954020] v9fs_mount+0x79/0x8f0 [ 2666.954720] ? v9fs_write_inode+0x60/0x60 [ 2666.955524] legacy_get_tree+0x105/0x220 [ 2666.956320] vfs_get_tree+0x8e/0x300 [ 2666.957035] path_mount+0x1429/0x2120 [ 2666.957779] ? strncpy_from_user+0x9e/0x470 [ 2666.958616] ? finish_automount+0xa90/0xa90 [ 2666.959452] ? getname_flags.part.0+0x1dd/0x4f0 [ 2666.960351] ? _copy_from_user+0xfb/0x1b0 [ 2666.961150] __x64_sys_mount+0x282/0x300 [ 2666.961926] ? copy_mnt_ns+0xa00/0xa00 [ 2666.962696] do_syscall_64+0x33/0x40 [ 2666.963418] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2666.964408] RIP: 0033:0x7ff784b43b19 [ 2666.965123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2666.968351] loop3: detected capacity change from 0 to 135266304 [ 2666.968690] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2666.968721] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2666.972826] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2666.973117] tmpfs: Bad value for 'mpol' [ 2666.974184] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2666.974194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2666.974204] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:08:25 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a60000"], 0x1c}}, 0x0) 23:08:25 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) 23:08:25 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x1, 0x3f, 0x2, 0x0, 0x11, 0x64021, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x9, 0x4}, 0x0, 0x2, 0x5, 0x3, 0x20, 0xe6e, 0x1, 0x0, 0x8}, r0, 0xf, r1, 0x1) chdir(0x0) 23:08:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc", 0xe9, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2667.239809] loop3: detected capacity change from 0 to 135266304 [ 2667.243440] tmpfs: Bad value for 'mpol' 23:08:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 40) 23:08:40 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:08:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0/../file0\x00', 0x1c0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x100000, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:08:40 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x300000e, 0x13, r4, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000300), &(0x7f0000000380)={'L+', 0x4}, 0x16, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)=ANY=[@ANYBLOB="131495450100ec6e91e97300", @ANYRES32=r1, @ANYBLOB="80000000000000002e2f66696c653000"]) bind(r6, &(0x7f0000000240)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x2, 0x3}}, 0x80) syz_io_uring_submit(0x0, r3, &(0x7f0000000140)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x2, 0x0, 0x0, 0x40, 0xf, 0x1, {0x0, 0x0, r0}}, 0x1927) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2090800, &(0x7f00000000c0)=ANY=[@ANYBLOB='none,cpuset_v2_mode,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c6d61736b3d5e4d41595f524541442c7375626a5f726f6c653d96f0e9f6ac080adb746578743d757365705f752c736d61636b66736465663d242725385b5c5e2c6d6561737572652c00"]) getdents64(r7, &(0x7f0000001e00)=""/4100, 0x1004) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) syz_io_uring_submit(r2, r3, &(0x7f0000000480)=@IORING_OP_ACCEPT={0xd, 0x7, 0x0, r8, &(0x7f00000003c0)=0x80, &(0x7f0000000400)=@ax25={{}, [@null, @netrom, @remote, @default, @rose, @null, @default, @bcast]}}, 0x10000) 23:08:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0xcf, 0x0, 0x8001, 0x9, 0x6}) chdir(0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) 23:08:40 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="350000009f00210c00000000000000fc04000200"], 0x14}}, 0x0) 23:08:40 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a6000000"], 0x1c}}, 0x0) [ 2681.872527] FAULT_INJECTION: forcing a failure. [ 2681.872527] name failslab, interval 1, probability 0, space 0, times 0 [ 2681.875198] CPU: 1 PID: 12577 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2681.876656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2681.878405] Call Trace: [ 2681.878975] dump_stack+0x107/0x167 [ 2681.879744] should_fail.cold+0x5/0xa [ 2681.880558] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2681.881769] should_failslab+0x5/0x20 [ 2681.882582] kmem_cache_alloc+0x5b/0x310 [ 2681.883457] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2681.884634] idr_get_free+0x4b5/0x8f0 [ 2681.885449] idr_alloc_u32+0x170/0x2d0 [ 2681.886278] ? __fprop_inc_percpu_max+0x130/0x130 [ 2681.887319] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2681.888450] ? lock_release+0x680/0x680 [ 2681.889280] idr_alloc+0xc2/0x130 [ 2681.890013] ? idr_alloc_u32+0x2d0/0x2d0 [ 2681.890868] ? rwlock_bug.part.0+0x90/0x90 [ 2681.891774] p9_client_prepare_req.part.0+0x612/0xac0 [ 2681.892867] p9_client_rpc+0x220/0x1370 [ 2681.893697] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2681.894803] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2681.895943] ? pipe_poll+0x21b/0x800 [ 2681.896724] ? p9_fd_close+0x4a0/0x4a0 [ 2681.897551] ? wait_for_partner+0x3c0/0x3c0 [ 2681.898526] ? p9_fd_poll+0x1e0/0x2c0 [ 2681.899371] ? p9_fd_create+0x357/0x4a0 [ 2681.900209] ? p9_conn_create+0x510/0x510 [ 2681.901090] ? p9_client_create+0x798/0x1230 [ 2681.902014] ? kfree+0xd7/0x340 [ 2681.902732] ? do_raw_spin_unlock+0x4f/0x220 [ 2681.903679] p9_client_create+0xa76/0x1230 [ 2681.904629] ? p9_client_flush+0x430/0x430 [ 2681.905528] ? trace_hardirqs_on+0x5b/0x180 [ 2681.906439] ? lockdep_init_map_type+0x2c7/0x780 [ 2681.907578] ? __raw_spin_lock_init+0x36/0x110 [ 2681.908557] v9fs_session_init+0x1dd/0x1680 [ 2681.909463] ? lock_release+0x680/0x680 [ 2681.910308] ? kmem_cache_alloc_trace+0x151/0x320 [ 2681.911334] ? v9fs_show_options+0x690/0x690 [ 2681.912265] ? trace_hardirqs_on+0x5b/0x180 [ 2681.913158] ? kasan_unpoison_shadow+0x33/0x50 [ 2681.914122] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2681.915184] v9fs_mount+0x79/0x8f0 [ 2681.915933] ? v9fs_write_inode+0x60/0x60 [ 2681.916792] legacy_get_tree+0x105/0x220 [ 2681.917630] vfs_get_tree+0x8e/0x300 [ 2681.918412] path_mount+0x1429/0x2120 [ 2681.919221] ? strncpy_from_user+0x9e/0x470 [ 2681.920131] ? finish_automount+0xa90/0xa90 [ 2681.921041] ? getname_flags.part.0+0x1dd/0x4f0 [ 2681.922019] ? _copy_from_user+0xfb/0x1b0 [ 2681.922913] __x64_sys_mount+0x282/0x300 [ 2681.923759] ? copy_mnt_ns+0xa00/0xa00 [ 2681.924593] do_syscall_64+0x33/0x40 [ 2681.925374] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2681.926460] RIP: 0033:0x7ff784b43b19 [ 2681.927256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2681.931145] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2681.932751] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2681.934253] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2681.935771] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2681.937260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2681.938766] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:08:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc", 0xe9, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:08:40 executing program 0: iopl(0x1) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x3, 0x20, 0x7, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:08:40 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdirat(r0, &(0x7f0000000000)='./file1\x00', 0x20) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}}, 0x0, 0x800000000f, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1/file0\x00', 0x40100, 0x180) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f00000000c0)={{0x9, 0x9b}, 0x100, './file1/file0\x00'}) 23:08:40 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10098, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44, 0x2, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f9}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0x9, &(0x7f00000017c0), 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0xff, 0x0, 0xdb, 0x8, 0x0, 0x9, 0x0, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0x4200, 0x1, 0x7ff, 0x5, 0x8, 0xffffffff, 0x9, 0x0, 0xffff, 0x0, 0x20000000000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x1, &(0x7f0000000200)={0x6, 0x1}, &(0x7f0000000240)) prlimit64(0xffffffffffffffff, 0xd, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x100000) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) prlimit64(0x0, 0x6, 0x0, &(0x7f0000000280)) setsockopt$inet_group_source_req(r3, 0x0, 0x4, 0x0, 0x0) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000180)) prlimit64(0x0, 0xa, &(0x7f00000002c0)={0x6}, &(0x7f0000000300)) prlimit64(0xffffffffffffffff, 0xc, &(0x7f00000000c0)={0x7, 0x3}, &(0x7f0000000100)) setresuid(0xffffffffffffffff, r2, 0x0) prlimit64(0x0, 0xc, 0x0, &(0x7f0000000140)) [ 2682.134494] loop3: detected capacity change from 0 to 135266304 23:08:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) openat(r2, &(0x7f0000000000)='./file0/../file0\x00', 0x80000, 0x181) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2682.182731] tmpfs: Bad value for 'mpol' 23:08:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64391, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x3, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3, 0xff, 0x64, 0x0, 0x0, 0x4, 0xc0a20, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4c, 0x4, @perf_bp={&(0x7f0000000000), 0x7}, 0x1000, 0x4, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x1000, 0x0, 0x7}, 0x0, 0x10, r0, 0x2) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000140)={{0x5f2641f6, 0x80000001}, 0x100, './file0\x00'}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000001e00)=""/4100, 0x1004) [ 2697.636263] FAULT_INJECTION: forcing a failure. [ 2697.636263] name failslab, interval 1, probability 0, space 0, times 0 [ 2697.637765] CPU: 0 PID: 12626 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2697.638657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2697.639631] Call Trace: [ 2697.639938] dump_stack+0x107/0x167 [ 2697.640356] should_fail.cold+0x5/0xa [ 2697.640798] ? create_object.isra.0+0x3a/0xa20 [ 2697.641329] should_failslab+0x5/0x20 [ 2697.641767] kmem_cache_alloc+0x5b/0x310 [ 2697.642241] create_object.isra.0+0x3a/0xa20 [ 2697.642742] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2697.643443] kmem_cache_alloc+0x159/0x310 [ 2697.644040] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2697.644824] idr_get_free+0x4b5/0x8f0 [ 2697.645361] idr_alloc_u32+0x170/0x2d0 [ 2697.645910] ? __fprop_inc_percpu_max+0x130/0x130 [ 2697.646615] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2697.647251] ? lock_release+0x680/0x680 [ 2697.647818] idr_alloc+0xc2/0x130 [ 2697.648302] ? idr_alloc_u32+0x2d0/0x2d0 [ 2697.648866] ? rwlock_bug.part.0+0x90/0x90 [ 2697.649398] p9_client_prepare_req.part.0+0x612/0xac0 [ 2697.650029] p9_client_rpc+0x220/0x1370 [ 2697.650583] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2697.651277] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2697.651999] ? pipe_poll+0x21b/0x800 [ 2697.652513] ? p9_fd_close+0x4a0/0x4a0 [ 2697.653541] ? wait_for_partner+0x3c0/0x3c0 [ 2697.654156] ? p9_fd_poll+0x1e0/0x2c0 [ 2697.654725] ? p9_fd_create+0x357/0x4a0 [ 2697.655325] ? p9_conn_create+0x510/0x510 [ 2697.655954] ? p9_client_create+0x798/0x1230 [ 2697.656581] ? kfree+0xd7/0x340 [ 2697.657078] ? do_raw_spin_unlock+0x4f/0x220 [ 2697.657725] p9_client_create+0xa76/0x1230 [ 2697.658376] ? p9_client_flush+0x430/0x430 [ 2697.658990] ? trace_hardirqs_on+0x5b/0x180 [ 2697.659650] ? lockdep_init_map_type+0x2c7/0x780 [ 2697.660334] ? __raw_spin_lock_init+0x36/0x110 [ 2697.660994] v9fs_session_init+0x1dd/0x1680 [ 2697.661625] ? lock_release+0x680/0x680 [ 2697.662207] ? kmem_cache_alloc_trace+0x151/0x320 [ 2697.662900] ? v9fs_show_options+0x690/0x690 [ 2697.663544] ? trace_hardirqs_on+0x5b/0x180 [ 2697.664164] ? kasan_unpoison_shadow+0x33/0x50 [ 2697.664810] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2697.665542] v9fs_mount+0x79/0x8f0 [ 2697.666075] ? v9fs_write_inode+0x60/0x60 [ 2697.666671] legacy_get_tree+0x105/0x220 [ 2697.667281] vfs_get_tree+0x8e/0x300 [ 2697.667826] path_mount+0x1429/0x2120 [ 2697.668396] ? strncpy_from_user+0x9e/0x470 [ 2697.669028] ? finish_automount+0xa90/0xa90 [ 2697.669639] ? getname_flags.part.0+0x1dd/0x4f0 [ 2697.670330] ? _copy_from_user+0xfb/0x1b0 [ 2697.670936] __x64_sys_mount+0x282/0x300 [ 2697.671531] ? copy_mnt_ns+0xa00/0xa00 [ 2697.672078] do_syscall_64+0x33/0x40 [ 2697.672579] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2697.673259] RIP: 0033:0x7ff784b43b19 [ 2697.673275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2697.673332] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2697.677425] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2697.678422] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2697.679481] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2697.680479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2697.681479] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:08:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c776e646e0400", @ANYRESHEX=r1, @ANYBLOB=',\x00']) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:08:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246", 0xe7, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:08:55 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:08:55 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8008}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) 23:08:55 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a6000000"], 0x1c}}, 0x0) 23:08:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc", 0xe9, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:08:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="e54c0ac16f3d00000000000000", @ANYRESHEX=r1, @ANYBLOB="2c7761ef6e6f3d", @ANYRESHEX=r2, @ANYBLOB=',\x00']) getdents(r1, &(0x7f00000000c0)=""/226, 0xe2) 23:08:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 41) [ 2697.715782] 9pnet: Insufficient options for proto=fd [ 2697.720508] 9pnet: Insufficient options for proto=fd 23:08:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x101800, 0x84) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2697.783816] loop3: detected capacity change from 0 to 135266304 23:08:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x846c0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) [ 2697.791497] tmpfs: Bad value for 'mpol' 23:08:56 executing program 1: ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000004c0)=""/4096) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup(r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r3) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r6, 0x325, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r5, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_PREV_BSSID={0xa, 0x4f, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @random="1f5149a309f4"}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x44010) 23:08:56 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c012b74a6000000"], 0x1c}}, 0x0) [ 2697.839454] loop0: detected capacity change from 0 to 135266304 [ 2697.864794] tmpfs: Bad value for 'mpol' 23:08:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 42) 23:08:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2697.976383] FAULT_INJECTION: forcing a failure. [ 2697.976383] name failslab, interval 1, probability 0, space 0, times 0 [ 2697.977775] CPU: 0 PID: 12661 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2697.978554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2697.979524] Call Trace: [ 2697.979830] dump_stack+0x107/0x167 [ 2697.980248] should_fail.cold+0x5/0xa [ 2697.980691] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2697.981353] should_failslab+0x5/0x20 [ 2697.981793] kmem_cache_alloc+0x5b/0x310 [ 2697.982266] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2697.982909] idr_get_free+0x4b5/0x8f0 [ 2697.983359] idr_alloc_u32+0x170/0x2d0 [ 2697.983824] ? __fprop_inc_percpu_max+0x130/0x130 [ 2697.984394] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2697.985013] ? lock_release+0x680/0x680 [ 2697.985471] idr_alloc+0xc2/0x130 [ 2697.985867] ? idr_alloc_u32+0x2d0/0x2d0 [ 2697.986327] ? rwlock_bug.part.0+0x90/0x90 [ 2697.986813] p9_client_prepare_req.part.0+0x612/0xac0 [ 2697.987429] p9_client_rpc+0x220/0x1370 [ 2697.987893] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2697.988509] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2697.989124] ? pipe_poll+0x21b/0x800 [ 2697.989549] ? p9_fd_close+0x4a0/0x4a0 [ 2697.989990] ? wait_for_partner+0x3c0/0x3c0 [ 2697.990489] ? p9_fd_poll+0x1e0/0x2c0 [ 2697.990934] ? p9_fd_create+0x357/0x4a0 [ 2697.991395] ? p9_conn_create+0x510/0x510 [ 2697.991888] ? p9_client_create+0x798/0x1230 [ 2697.992389] ? kfree+0xd7/0x340 [ 2697.992762] ? do_raw_spin_unlock+0x4f/0x220 [ 2697.993273] p9_client_create+0xa76/0x1230 [ 2697.993761] ? p9_client_flush+0x430/0x430 [ 2697.994249] ? trace_hardirqs_on+0x5b/0x180 [ 2697.994788] ? lockdep_init_map_type+0x2c7/0x780 [ 2697.995334] ? __raw_spin_lock_init+0x36/0x110 [ 2697.995914] v9fs_session_init+0x1dd/0x1680 [ 2697.996404] ? lock_release+0x680/0x680 [ 2697.996864] ? kmem_cache_alloc_trace+0x151/0x320 [ 2697.997415] ? v9fs_show_options+0x690/0x690 [ 2697.997925] ? trace_hardirqs_on+0x5b/0x180 [ 2697.998417] ? kasan_unpoison_shadow+0x33/0x50 [ 2697.998937] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2697.999551] v9fs_mount+0x79/0x8f0 [ 2697.999960] ? v9fs_write_inode+0x60/0x60 [ 2698.000433] legacy_get_tree+0x105/0x220 [ 2698.000896] vfs_get_tree+0x8e/0x300 [ 2698.001322] path_mount+0x1429/0x2120 [ 2698.001753] ? strncpy_from_user+0x9e/0x470 [ 2698.002240] ? finish_automount+0xa90/0xa90 [ 2698.002730] ? getname_flags.part.0+0x1dd/0x4f0 [ 2698.003255] ? _copy_from_user+0xfb/0x1b0 [ 2698.003756] __x64_sys_mount+0x282/0x300 [ 2698.004221] ? copy_mnt_ns+0xa00/0xa00 [ 2698.004668] do_syscall_64+0x33/0x40 [ 2698.005088] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2698.005667] RIP: 0033:0x7ff784b43b19 [ 2698.006091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2698.008191] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2698.009052] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2698.009864] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2698.010677] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2698.011507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2698.012313] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:08:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee00}}, {@cachetag={'cachetag', 0x3d, 'posi\x02 \x04\x00'}}, {@loose}, {@privport}]}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:08:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246", 0xe7, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:08:56 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001f7434e22f78ac3ba18e4df700210c000000000002000004000200269e7534a6981f02ea0a0cec54522486c4cb153529b83991049a4b489b593c5337c538e0b3e7835bc82af3411663e59c8f8225e82cebe25c3d9c0ea4f4304f72a2aff1a053eb2f7b6713ca84ac1c7fed6d4ee4670b532989487edbdf59"], 0x14}}, 0x0) [ 2698.089403] loop3: detected capacity change from 0 to 135266304 [ 2698.091685] tmpfs: Bad value for 'mpol' [ 2698.162484] loop0: detected capacity change from 0 to 135266304 [ 2698.191745] tmpfs: Bad value for 'mpol' 23:09:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 43) 23:09:14 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2715.763711] FAULT_INJECTION: forcing a failure. [ 2715.763711] name failslab, interval 1, probability 0, space 0, times 0 [ 2715.766541] CPU: 1 PID: 12683 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2715.768289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2715.770407] Call Trace: [ 2715.771075] dump_stack+0x107/0x167 [ 2715.772025] should_fail.cold+0x5/0xa [ 2715.773002] ? ___slab_alloc+0x155/0x700 [ 2715.774040] ? create_object.isra.0+0x3a/0xa20 [ 2715.775211] should_failslab+0x5/0x20 [ 2715.776194] kmem_cache_alloc+0x5b/0x310 [ 2715.777222] create_object.isra.0+0x3a/0xa20 [ 2715.778337] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2715.779683] kmem_cache_alloc+0x159/0x310 [ 2715.780758] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2715.782189] idr_get_free+0x4b5/0x8f0 [ 2715.783180] idr_alloc_u32+0x170/0x2d0 [ 2715.784180] ? __fprop_inc_percpu_max+0x130/0x130 [ 2715.785370] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2715.786562] ? lock_release+0x680/0x680 [ 2715.787472] idr_alloc+0xc2/0x130 [ 2715.788262] ? idr_alloc_u32+0x2d0/0x2d0 [ 2715.789182] ? rwlock_bug.part.0+0x90/0x90 [ 2715.790163] p9_client_prepare_req.part.0+0x612/0xac0 [ 2715.791349] p9_client_rpc+0x220/0x1370 [ 2715.792251] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2715.793438] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2715.794640] ? pipe_poll+0x21b/0x800 [ 2715.795522] ? p9_fd_close+0x4a0/0x4a0 [ 2715.796410] ? wait_for_partner+0x3c0/0x3c0 [ 2715.797371] ? p9_fd_poll+0x1e0/0x2c0 [ 2715.798235] ? p9_fd_create+0x357/0x4a0 [ 2715.799123] ? p9_conn_create+0x510/0x510 [ 2715.800246] ? p9_client_create+0x798/0x1230 [ 2715.801252] ? kfree+0xd7/0x340 23:09:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:09:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000002300210c000000000000000010000200"], 0x14}}, 0x0) 23:09:14 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000240)=ANY=[@ANYBLOB="94c2880a737f9b6e9e0700139882be82d751a22a57191153f88ab99fc6543ea14f935b0f5790c3e6ddc624286546edab5c48386cdf3542ec68d57469aba2de8a127bbb812b2f0bfe4b220f04cd04203082f2980a6bba159236ba89ab9892590b04589bbe2c1e9ae160e98bdf85ffd6377e216d7c42964206ff771919ee1067580000000000000000000000f105000000084e67b7d4362bc7197b22a4a49eb390b05e262fb0ac820b449e71a21e1b0ed0e823ed6326f952807a990177395d516c285849dae81bdd01a5ae41", @ANYRES16=r2, @ANYBLOB="030000b7d6ff0000af6ebfd6c4b9d3f9d1195f918c6660cacefe19fa74", @ANYRESDEC], 0x24}}, 0x0) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x8003}, 0x20040) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8200, 0x0) getdents64(r3, &(0x7f0000001e00)=""/4100, 0x1004) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/59, 0x3b) 23:09:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0\x00', 0x2000, 0x1f) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) writev(r5, &(0x7f0000000140), 0x0) r6 = openat$incfs(r0, &(0x7f0000000180)='.log\x00', 0x200, 0x42) dup2(r1, r6) 23:09:14 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2715.801984] ? do_raw_spin_unlock+0x4f/0x220 [ 2715.803044] p9_client_create+0xa76/0x1230 [ 2715.804005] ? p9_client_flush+0x430/0x430 [ 2715.805050] ? trace_hardirqs_on+0x5b/0x180 [ 2715.806032] ? lockdep_init_map_type+0x2c7/0x780 [ 2715.807104] ? __raw_spin_lock_init+0x36/0x110 [ 2715.808166] v9fs_session_init+0x1dd/0x1680 [ 2715.809137] ? lock_release+0x680/0x680 [ 2715.810056] ? kmem_cache_alloc_trace+0x151/0x320 [ 2715.811158] ? v9fs_show_options+0x690/0x690 [ 2715.812182] ? trace_hardirqs_on+0x5b/0x180 23:09:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2715.813169] ? kasan_unpoison_shadow+0x33/0x50 [ 2715.814394] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2715.815542] v9fs_mount+0x79/0x8f0 [ 2715.816359] ? v9fs_write_inode+0x60/0x60 [ 2715.817297] legacy_get_tree+0x105/0x220 [ 2715.818231] vfs_get_tree+0x8e/0x300 [ 2715.819089] path_mount+0x1429/0x2120 [ 2715.819971] ? strncpy_from_user+0x9e/0x470 [ 2715.820952] ? finish_automount+0xa90/0xa90 [ 2715.821915] ? getname_flags.part.0+0x1dd/0x4f0 [ 2715.823242] ? _copy_from_user+0xfb/0x1b0 [ 2715.824212] __x64_sys_mount+0x282/0x300 [ 2715.825141] ? copy_mnt_ns+0xa00/0xa00 [ 2715.826047] do_syscall_64+0x33/0x40 [ 2715.826936] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2715.828123] RIP: 0033:0x7ff784b43b19 [ 2715.828982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2715.833238] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2715.834976] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2715.836616] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2715.838264] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2715.839905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2715.841546] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2715.872863] loop5: detected capacity change from 0 to 135266304 [ 2715.880717] loop3: detected capacity change from 0 to 135266304 [ 2715.882760] tmpfs: Bad value for 'mpol' [ 2715.890572] tmpfs: Bad value for 'mpol' 23:09:14 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xe1}}, './file0\x00'}) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000100)=""/106) r1 = syz_open_dev$loop(&(0x7f0000000180), 0x1, 0x4800) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000300)={0x1, 0x2, 0x1000, 0xef, &(0x7f00000001c0)="62133fd7653efbb4bad831d190d6623a794058d79c80c4799e949576717dd0652e12a241c9749ddb17d781484fddfd8f61925b5f165f8af8c74d890406d3af5b9102f29479658bc9e8ea2b968853dfeea3bc21b3bc75291e0be7152465c7a9a9ee3003be558c0309211ec82d8a414d43fadbdc54c444cbe7a0d589746408dc7c7f93f9ec60d08fd0603ebab9e19b0782df95d02fa0d3eeea0982b678a3efdef5c8e7550611603c79b09e2d3e974496dce738f152e73c2a6bf42101c939de76ecbdd25ab5c53407d456d211cd40c455c7cfefc46b6af3e051741d19455104d4f59c1fd392adeb1184bc110248745001", 0x5, 0x0, &(0x7f00000002c0)="503021ba96"}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000080)=""/15) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001f0021200000000059c06ae7cffc"], 0x14}}, 0x0) 23:09:14 executing program 5: ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000004c0)=""/4096) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup(r3) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r3) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r6, 0x325, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r5, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_PREV_BSSID={0xa, 0x4f, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @random="1f5149a309f4"}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x44010) 23:09:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000140)=""/87, 0x57}, {&(0x7f00000001c0)=""/194, 0xc2}, {&(0x7f0000000040)}, {&(0x7f00000002c0)=""/67, 0x43}, {&(0x7f0000000380)=""/99, 0x63}, {&(0x7f0000000400)=""/207, 0xcf}, {&(0x7f0000000500)=""/184, 0xb8}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f0000000640)=""/102, 0x66}, {&(0x7f00000006c0)=""/4096, 0x1000}], 0xa, &(0x7f0000001780)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb0}}], 0x1, 0x40010101, &(0x7f0000001880)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r5, 0x0, 0x0, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x50) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000001940)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a40)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r8, 0x0) mount$9p_fd(0x0, &(0x7f00000018c0)='./file0\x00', &(0x7f0000001900), 0x40000, &(0x7f0000001a80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@aname={'aname', 0x3d, '/proc/consoles\x00'}}, {@posixacl}, {@posixacl}, {@version_L}, {@msize={'msize', 0x3d, 0x7}}], [{@uid_lt={'uid<', r3}}, {@dont_appraise}, {@fowner_eq={'fowner', 0x3d, r6}}, {@obj_user={'obj_user', 0x3d, '/$(\'![['}}, {@fowner_lt={'fowner<', r7}}, {@smackfsfloor={'smackfsfloor', 0x3d, '*\xe8/'}}, {@subj_role={'subj_role', 0x3d, '/proc/consoles\x00'}}, {@subj_role={'subj_role', 0x3d, '-[].'}}, {@uid_eq={'uid', 0x3d, r8}}]}}) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x33, 0x0, 0xda, 0x0, 0x3, 0x3101a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9e4, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x400, 0x800, 0x7fff, 0x1, 0x2, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5}, r1, 0x7, r4, 0x1) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:09:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:09:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x7, 0x4, 0xb55, 0x2c, @mcast2, @private0, 0x1, 0x7800, 0x8, 0x2}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r3, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r5], 0x38}}], 0x1, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r6, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r8], 0x38}}], 0x1, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x140, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x4000000}, 0x2402c8d4) 23:09:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 44) 23:09:14 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000001e00)=""/4100, 0x1004) getdents64(r0, &(0x7f0000000380)=""/4096, 0x1000) [ 2716.150941] loop3: detected capacity change from 0 to 135266304 [ 2716.195635] FAULT_INJECTION: forcing a failure. [ 2716.195635] name failslab, interval 1, probability 0, space 0, times 0 [ 2716.196886] CPU: 0 PID: 12724 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2716.197672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2716.197809] tmpfs: Bad value for 'mpol' [ 2716.198583] Call Trace: [ 2716.198602] dump_stack+0x107/0x167 [ 2716.198614] should_fail.cold+0x5/0xa [ 2716.198630] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2716.198644] should_failslab+0x5/0x20 [ 2716.198655] kmem_cache_alloc+0x5b/0x310 [ 2716.198671] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2716.198687] idr_get_free+0x4b5/0x8f0 [ 2716.198710] idr_alloc_u32+0x170/0x2d0 [ 2716.198724] ? __fprop_inc_percpu_max+0x130/0x130 [ 2716.198747] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2716.205494] ? lock_release+0x680/0x680 [ 2716.206055] idr_alloc+0xc2/0x130 [ 2716.206538] ? idr_alloc_u32+0x2d0/0x2d0 [ 2716.207104] ? rwlock_bug.part.0+0x90/0x90 [ 2716.207632] p9_client_prepare_req.part.0+0x612/0xac0 [ 2716.208370] p9_client_rpc+0x220/0x1370 [ 2716.208919] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2716.209675] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2716.210357] ? pipe_poll+0x21b/0x800 [ 2716.210897] ? p9_fd_close+0x4a0/0x4a0 [ 2716.211447] ? wait_for_partner+0x3c0/0x3c0 [ 2716.212064] ? p9_fd_poll+0x1e0/0x2c0 [ 2716.212530] ? p9_fd_create+0x357/0x4a0 [ 2716.212978] ? p9_conn_create+0x510/0x510 [ 2716.213430] ? p9_client_create+0x798/0x1230 [ 2716.213902] ? kfree+0xd7/0x340 [ 2716.214262] ? do_raw_spin_unlock+0x4f/0x220 [ 2716.214839] p9_client_create+0xa76/0x1230 [ 2716.215305] ? p9_client_flush+0x430/0x430 [ 2716.215795] ? trace_hardirqs_on+0x5b/0x180 [ 2716.216268] ? lockdep_init_map_type+0x2c7/0x780 [ 2716.216811] ? __raw_spin_lock_init+0x36/0x110 [ 2716.217316] v9fs_session_init+0x1dd/0x1680 [ 2716.217813] ? lock_release+0x680/0x680 [ 2716.218256] ? kmem_cache_alloc_trace+0x151/0x320 [ 2716.218780] ? v9fs_show_options+0x690/0x690 [ 2716.219283] ? trace_hardirqs_on+0x5b/0x180 [ 2716.219775] ? kasan_unpoison_shadow+0x33/0x50 [ 2716.220307] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2716.220890] v9fs_mount+0x79/0x8f0 [ 2716.221275] ? v9fs_write_inode+0x60/0x60 [ 2716.221756] legacy_get_tree+0x105/0x220 [ 2716.222198] vfs_get_tree+0x8e/0x300 [ 2716.222615] path_mount+0x1429/0x2120 [ 2716.223059] ? strncpy_from_user+0x9e/0x470 [ 2716.223562] ? finish_automount+0xa90/0xa90 [ 2716.224177] ? getname_flags.part.0+0x1dd/0x4f0 [ 2716.224828] ? _copy_from_user+0xfb/0x1b0 [ 2716.225421] __x64_sys_mount+0x282/0x300 [ 2716.225978] ? copy_mnt_ns+0xa00/0xa00 [ 2716.226539] do_syscall_64+0x33/0x40 [ 2716.227072] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2716.227707] RIP: 0033:0x7ff784b43b19 [ 2716.228120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2716.230190] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2716.231008] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2716.231784] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2716.232610] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2716.233428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2716.234244] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:09:14 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r1 = getpid() r2 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, r2) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) dup3(r4, r3, 0x80000) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3f, 0x7f, 0x6, 0x3b, 0x0, 0x800, 0x20081, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xe26a}, 0x10, 0x1, 0x2, 0x8, 0x20, 0x81, 0x3, 0x0, 0x7a, 0x0, 0x2}, r1, 0x9, r0, 0x3) tkill(0xffffffffffffffff, 0x3a) 23:09:14 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r1 = getpid() r2 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x1, r2) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) dup3(r4, r3, 0x80000) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3f, 0x7f, 0x6, 0x3b, 0x0, 0x800, 0x20081, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0xe26a}, 0x10, 0x1, 0x2, 0x8, 0x20, 0x81, 0x3, 0x0, 0x7a, 0x0, 0x2}, r1, 0x9, r0, 0x3) tkill(0xffffffffffffffff, 0x3a) 23:09:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:09:33 executing program 1: r0 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xa, 0x0, 0x0, 0x1, [@generic="487fec864b24"]}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r1) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=r2, @ANYBLOB="07002cbd7000ffdbdf2504000000740002802c000380080002000400000008000100ff07000008000100050000000800010000df000008000200400000003c000380080002000700000008006bf02ab26463420200090000000800020008000000080001009303000008000200400000000800020002000000080001004f00000008000200ff010000"], 0x88}, 0x1, 0x0, 0x0, 0x90}, 0x40090) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x64, r2, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4080}, 0x8000) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1cc, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xc4fb}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3f}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4e4ecf77}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x48}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xff}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}, @TIPC_NLA_BEARER={0x74, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x80000001, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @loopback, 0x10001}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0xc2050}, 0x4094) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000000000000000000004000200"], 0x14}}, 0x0) 23:09:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x1620, 0x40400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x3) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) 23:09:33 executing program 5: open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80400, 0x40) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', &(0x7f0000000540)) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', r0, r1, 0x100) r3 = open(&(0x7f0000000400)='./file1/file0\x00', 0x100, 0x40) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000140)={0x1, 0x8, 0x6}) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000df25010000001fb1cbc5be085e0ef9decbc486164f53554c5d1442201eacd555877716bca5738852783d741663b874a926707746ac763e0716a42ff3a2073ef5b7ea7daa98b7ddf3e9b11a437c92e785bbff5f928fbfa4f4e20f4cb072f7955505996a39d6f99eebcb745ee4dbd6899b79c4f718d7f816af86048c3e1d9dd1823c71b198fa8d148a2d449cf25c19"], 0x14}}, 0x4040000) openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') openat(r4, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x80001, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="1c0000001d00210c00000000000000000400020008000c0000000000a0c01075d042bd4ba35bcc1dca2618bce597c156961a28b7956ff984698f7c6e3a2b7698ba04db7b7be61492e74417e73ff173685a2ebe01a8dd4f70a84f199ab89caa578fb92a77e34bc60d7bcfeedb5822b6e05172f41094783fd39b8c"], 0x1c}}, 0x0) 23:09:33 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:09:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 45) 23:09:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:09:33 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2735.334271] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2735.342302] FAULT_INJECTION: forcing a failure. [ 2735.342302] name failslab, interval 1, probability 0, space 0, times 0 [ 2735.344806] CPU: 0 PID: 12753 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2735.346352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2735.348209] Call Trace: [ 2735.348827] dump_stack+0x107/0x167 [ 2735.349620] should_fail.cold+0x5/0xa [ 2735.350467] ? create_object.isra.0+0x3a/0xa20 [ 2735.351488] should_failslab+0x5/0x20 [ 2735.352349] kmem_cache_alloc+0x5b/0x310 [ 2735.353278] create_object.isra.0+0x3a/0xa20 [ 2735.354226] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2735.355368] kmem_cache_alloc+0x159/0x310 [ 2735.356309] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 2735.357654] idr_get_free+0x4b5/0x8f0 [ 2735.358537] idr_alloc_u32+0x170/0x2d0 [ 2735.359414] ? __fprop_inc_percpu_max+0x130/0x130 [ 2735.360509] ? p9_client_prepare_req.part.0+0x20a/0xac0 [ 2735.361840] ? lock_release+0x680/0x680 [ 2735.362797] idr_alloc+0xc2/0x130 [ 2735.363612] ? idr_alloc_u32+0x2d0/0x2d0 [ 2735.364511] ? rwlock_bug.part.0+0x90/0x90 [ 2735.365456] p9_client_prepare_req.part.0+0x612/0xac0 [ 2735.366571] p9_client_rpc+0x220/0x1370 [ 2735.367427] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2735.368638] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2735.369893] ? pipe_poll+0x21b/0x800 [ 2735.370749] ? p9_fd_close+0x4a0/0x4a0 [ 2735.371650] ? wait_for_partner+0x3c0/0x3c0 [ 2735.372683] ? p9_fd_poll+0x1e0/0x2c0 [ 2735.373691] ? p9_fd_create+0x357/0x4a0 [ 2735.374730] ? p9_conn_create+0x510/0x510 [ 2735.375805] ? p9_client_create+0x798/0x1230 [ 2735.376969] ? kfree+0xd7/0x340 [ 2735.377824] ? do_raw_spin_unlock+0x4f/0x220 [ 2735.378984] p9_client_create+0xa76/0x1230 [ 2735.380096] ? p9_client_flush+0x430/0x430 [ 2735.381209] ? trace_hardirqs_on+0x5b/0x180 [ 2735.382329] ? lockdep_init_map_type+0x2c7/0x780 [ 2735.383568] ? __raw_spin_lock_init+0x36/0x110 [ 2735.384780] v9fs_session_init+0x1dd/0x1680 [ 2735.385901] ? lock_release+0x680/0x680 [ 2735.386952] ? kmem_cache_alloc_trace+0x151/0x320 [ 2735.388196] ? v9fs_show_options+0x690/0x690 [ 2735.389377] ? trace_hardirqs_on+0x5b/0x180 [ 2735.390505] ? kasan_unpoison_shadow+0x33/0x50 [ 2735.391690] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2735.393020] v9fs_mount+0x79/0x8f0 [ 2735.393946] ? v9fs_write_inode+0x60/0x60 [ 2735.395031] legacy_get_tree+0x105/0x220 [ 2735.396091] vfs_get_tree+0x8e/0x300 [ 2735.397076] path_mount+0x1429/0x2120 [ 2735.398081] ? strncpy_from_user+0x9e/0x470 [ 2735.399204] ? finish_automount+0xa90/0xa90 [ 2735.400332] ? getname_flags.part.0+0x1dd/0x4f0 [ 2735.401550] ? _copy_from_user+0xfb/0x1b0 [ 2735.402639] __x64_sys_mount+0x282/0x300 [ 2735.403693] ? copy_mnt_ns+0xa00/0xa00 [ 2735.404737] do_syscall_64+0x33/0x40 [ 2735.405782] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2735.407117] RIP: 0033:0x7ff784b43b19 [ 2735.408120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2735.412902] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2735.414876] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2735.416720] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2735.418550] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2735.420379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2735.422220] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:09:33 executing program 4: getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/82, 0x52, 0x1, &(0x7f0000000380)=""/4096, 0x1000}, &(0x7f0000000100)=0x40) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x7ff, 0x0, 0x0, 0x200000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001e00)=""/4100, 0x1004) [ 2735.567605] loop3: detected capacity change from 0 to 135266304 23:09:33 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x230, 0x19, 0x10, 0x70bd28, 0x25dfdbfe, {0x15}, [@nested={0x219, 0x53, 0x0, 0x1, [@generic="274b2e5be20026743ed45340dc071c9e36084571364b876e30194a3dbd9f1e83440a4f1ebeb7705d571777c8d78c099e131b4da55a4b90bfc850de9a98d885e13befc5282fe6271b383911a027d06883b2a08efc071eaa826b03b0682db9", @generic="d84fdec7676bec30dfaccd803c7383bfdad76b1dffea45be18fc17314372e707a6846de1fb9adea413039cb58841d34921b08b27637e3d1b4f68a5b5734046e138ae44290fec34337a1dc525dd331550fbb30ce06c9fd1202947821a427fb637815768610cc043517215c38b62d279f3d8d854baaec5faff22e6cf35f02c9a7aa424757075", @generic="f0026614132f3d6bf2a0cae9431cd2ed476d5367e70de7efd0d7092e7978ffea40d44ca86e16a949b9cef02bc4e6585cda0ac088a15cdb4f34a27cd74f1a4e7996d6a60ad8ecf2a62750a5f8092ae87f49913f0de226dbc3", @generic="55e3a90870a89b156e5e89894c2165cd3032d9b0ad0842eca26a134ed6179a16b4b9815d3756e65821b729925256e7c207557fbbcc581f1a5a9f5c6294555106f323ce06ded5ae2ce96a2377ba299342eed839f8f228a2c4a909932823d29ff9c9aab99b685d3682a0ae17fae62e4d08d4ffbfc7884dd76202765a4f27b3638a90e653f8646a3f799a020736c1aafb96828bebb78b171b20714fe570367651cb3f10c57ec4954b3298236ed5073fe92b7e1b39794ffe2b6f160215e5d6a74b234f4e9c2bb38d17745cd2d7379a53331909dc", @typed={0x8, 0x21, 0x0, 0x0, @ipv4=@loopback}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 23:09:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:09:34 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) fdatasync(r1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$PTP_CLOCK_GETCAPS(r2, 0x80503d01, &(0x7f0000000040)) 23:09:34 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0x0, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:09:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 46) [ 2735.847852] loop3: detected capacity change from 0 to 135266304 [ 2735.916073] FAULT_INJECTION: forcing a failure. [ 2735.916073] name failslab, interval 1, probability 0, space 0, times 0 [ 2735.919209] CPU: 1 PID: 12784 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2735.920827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2735.922739] Call Trace: [ 2735.923364] dump_stack+0x107/0x167 [ 2735.924212] should_fail.cold+0x5/0xa [ 2735.925119] ? p9pdu_readf+0xadb/0x1d40 [ 2735.926040] should_failslab+0x5/0x20 [ 2735.926914] __kmalloc+0x72/0x390 [ 2735.927721] p9pdu_readf+0xadb/0x1d40 [ 2735.928609] ? pipe_poll+0x21b/0x800 [ 2735.929486] ? p9pdu_writef+0x100/0x100 [ 2735.930406] ? p9_fd_poll+0x1e0/0x2c0 [ 2735.931294] ? p9_fd_create+0x357/0x4a0 [ 2735.932215] ? p9_conn_create+0x510/0x510 [ 2735.933185] ? p9_client_create+0x798/0x1230 [ 2735.934190] ? kfree+0xd7/0x340 [ 2735.934948] ? do_raw_spin_unlock+0x4f/0x220 [ 2735.935972] p9_client_create+0xaee/0x1230 [ 2735.936969] ? p9_client_flush+0x430/0x430 [ 2735.937935] ? trace_hardirqs_on+0x5b/0x180 [ 2735.938919] ? lockdep_init_map_type+0x2c7/0x780 [ 2735.939998] ? __raw_spin_lock_init+0x36/0x110 [ 2735.941070] v9fs_session_init+0x1dd/0x1680 [ 2735.942055] ? lock_release+0x680/0x680 [ 2735.942977] ? kmem_cache_alloc_trace+0x151/0x320 [ 2735.944080] ? v9fs_show_options+0x690/0x690 [ 2735.945105] ? trace_hardirqs_on+0x5b/0x180 [ 2735.946088] ? kasan_unpoison_shadow+0x33/0x50 [ 2735.947127] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2735.948281] v9fs_mount+0x79/0x8f0 [ 2735.949111] ? v9fs_write_inode+0x60/0x60 [ 2735.950056] legacy_get_tree+0x105/0x220 [ 2735.950987] vfs_get_tree+0x8e/0x300 [ 2735.951832] path_mount+0x1429/0x2120 [ 2735.952700] ? strncpy_from_user+0x9e/0x470 [ 2735.953752] ? finish_automount+0xa90/0xa90 [ 2735.954734] ? getname_flags.part.0+0x1dd/0x4f0 [ 2735.955781] ? _copy_from_user+0xfb/0x1b0 [ 2735.956738] __x64_sys_mount+0x282/0x300 [ 2735.957658] ? copy_mnt_ns+0xa00/0xa00 [ 2735.958557] do_syscall_64+0x33/0x40 [ 2735.959399] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2735.960550] RIP: 0033:0x7ff784b43b19 [ 2735.961407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2735.965520] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2735.967216] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2735.968815] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2735.970415] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2735.972009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2735.973609] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:09:50 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:09:50 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:09:50 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0x0, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:09:50 executing program 2: sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x0, 0x2, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0x6f}}}}, ["", "", "", "", ""]}, 0x20}}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:09:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:09:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 47) 23:09:50 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:09:50 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0xd}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) [ 2751.790849] FAULT_INJECTION: forcing a failure. [ 2751.790849] name failslab, interval 1, probability 0, space 0, times 0 [ 2751.793363] CPU: 1 PID: 12807 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2751.794865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2751.796677] Call Trace: [ 2751.797251] dump_stack+0x107/0x167 [ 2751.798049] should_fail.cold+0x5/0xa [ 2751.798904] ? p9pdu_readf+0xadb/0x1d40 [ 2751.799771] should_failslab+0x5/0x20 [ 2751.800600] __kmalloc+0x72/0x390 [ 2751.801369] p9pdu_readf+0xadb/0x1d40 [ 2751.802200] ? pipe_poll+0x21b/0x800 [ 2751.803007] ? p9pdu_writef+0x100/0x100 [ 2751.803869] ? p9_fd_poll+0x1e0/0x2c0 [ 2751.804699] ? p9_fd_create+0x357/0x4a0 [ 2751.805552] ? p9_conn_create+0x510/0x510 [ 2751.806418] ? p9_client_create+0x798/0x1230 [ 2751.807340] ? kfree+0xd7/0x340 [ 2751.808034] ? do_raw_spin_unlock+0x4f/0x220 [ 2751.808954] p9_client_create+0xaee/0x1230 [ 2751.809852] ? p9_client_flush+0x430/0x430 [ 2751.810733] ? trace_hardirqs_on+0x5b/0x180 [ 2751.811634] ? lockdep_init_map_type+0x2c7/0x780 [ 2751.812626] ? __raw_spin_lock_init+0x36/0x110 [ 2751.813628] v9fs_session_init+0x1dd/0x1680 [ 2751.814542] ? kmem_cache_alloc_trace+0x151/0x320 [ 2751.815544] ? v9fs_show_options+0x690/0x690 [ 2751.816469] ? trace_hardirqs_on+0x5b/0x180 [ 2751.817372] ? kasan_unpoison_shadow+0x33/0x50 [ 2751.818324] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2751.819387] v9fs_mount+0x79/0x8f0 [ 2751.820127] ? v9fs_write_inode+0x60/0x60 [ 2751.820999] legacy_get_tree+0x105/0x220 [ 2751.821925] vfs_get_tree+0x8e/0x300 [ 2751.822720] path_mount+0x1429/0x2120 [ 2751.823514] ? strncpy_from_user+0x9e/0x470 [ 2751.824415] ? finish_automount+0xa90/0xa90 [ 2751.825318] ? getname_flags.part.0+0x1dd/0x4f0 [ 2751.826294] ? _copy_from_user+0xfb/0x1b0 [ 2751.827166] __x64_sys_mount+0x282/0x300 [ 2751.828008] ? copy_mnt_ns+0xa00/0xa00 [ 2751.828829] do_syscall_64+0x33/0x40 [ 2751.829611] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2751.830671] RIP: 0033:0x7ff784b43b19 [ 2751.831447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2751.835280] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2751.836860] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2751.838354] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2751.839835] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2751.841332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2751.842830] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 sendmsg$nl_generic(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000028c0)={0x33b0, 0x31, 0x1, 0x70bd2d, 0x25dfdbfc, {0x1f}, [@typed={0x6, 0x24, 0x0, 0x0, @str='-\x00'}, @nested={0x3075, 0x2, 0x0, 0x1, [@typed={0x6, 0x3c, 0x0, 0x0, @str='^\x00'}, @generic="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", @typed={0x8, 0x4b, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}, @typed={0x8, 0x93, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="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", @generic="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", @typed={0x8, 0x5e, 0x0, 0x0, @pid=r4}, @generic="03636f9ddec233d26737d0ef3b3be7c312e529e5fa6ce940ce9c2633f6e79be19d91b73bbae4be7004a7f44854e81165f6d8d139a374713c71778b11d5483151a23d7a8fad74e59e448550ed113487ed56"]}, @nested={0x4, 0x53}, @typed={0x8, 0x10, 0x0, 0x0, @fd=r0}, @nested={0x30f, 0x0, 0x0, 0x1, [@generic="cc8a0d055ca5cf080a3a9386e1dc6d378b92ac0afad82846aae1a26dc3019f6834d2f0d853a5a3489d3bb5", @generic="e541f1238656433f94ab1e334d7fc91a971ece25da1cfa4ddeea938548920fffa5ba5b2debdd2f73d0d2e816c006a77cc3f7f901e510a6c5d360a1d83bae63774f0feb1d90fc1f98f7631a52557d77830e406009aec641ffd88e661b7cbf586a5a00a25ccc5a1f1795f1c2edd611fa0987bee6fb13351fba355b6f125b3fe7fb39c3d5b7f3adfc280ada2103ecd34a20892dec10957a", @typed={0x8, 0xe, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}, @generic="fa3d9fee15155205f91570465679e49197d429b0ab1c8dbe9f842226d61b69d787d60811220664b8dc03879416d20e701517f3b04479a5252cc2d5aa3d21330f0a", @typed={0x8, 0x5, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="413d61ce7e60b02831132e41208b76f069a03eb1619fc0b6b0e4533b1417c41188af05c6f5844db62c4be0a519fee4c6b23725bdb945d187c7b8084caa2b2af7f4ab76cfc136047a5bba0aa06019d5d9efc4f3ba56a4e765849e37a55d94f9537f43c4b93fcdbb8b977bbb9fd60934ecec9adc60909e635f2c2da4da0ec7f4ecc8e93013d8fad4be20bc5074c9f9d6a1d2c3a577e34003ac3f39d47c753977d993232c3dfbe4390e3c5fd04d3e1fc9c603ffcccd54ec7e17099de67b4aeb467fadb75a78cb2ddb29dcd865ea23fa6bb23fb9bd071f9747fd2a5056bfdd0b95", @typed={0x14, 0x92, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0xb}}, @generic="a752821e22c077955bb3f7969bd3321e7d5db9a12b95f21a10898ac0be957ef0ddd153dfdf4fd3d640ca39983481c02f51e69d02af0182c972433fe34f1f8e0bab96fd8f884ab32cbd1251897673bd329fe14ef78bce97bbf54adf049426ddc9015e", @generic="cf9abd85a934ab7a2b3da8c333e3c391e1791d99dae28765a7d886e459a6325b52c7fbeb4096bbbd89418ea0fe77c32488fb9444ac270ddadfe564e590b015a13484054a13b56300d100ccd8303896c88ff45116326c9d0593ff4f3c385eb45a9c881e6e5acd6f73d6f70692e0dc086d84c8548252ebc124100e85a45856dbc49af9992af7caf44f3aab2679609afe0e825fb89f054b490ac8e6880b", @typed={0x8, 0x96, 0x0, 0x0, @ipv4=@private=0xa010102}]}]}, 0x33b0}, 0x1, 0x0, 0x0, 0x804}, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x8) [ 2751.873370] loop3: detected capacity change from 0 to 135266304 23:09:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:09:50 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x7, 0x80, 0x0, 0x0, 0x5, 0x12020, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x4, 0x7}, 0x4000, 0x9, 0x9, 0x6, 0x3, 0x5, 0x4, 0x0, 0x7, 0x0, 0x7}, r1, 0xc, r0, 0xa) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xac, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x0, 0x4, 0x1ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x17}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}]}, @IPVS_CMD_ATTR_DEST={0x34}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}]}, 0xac}, 0x1, 0x0, 0x0, 0x4041}, 0x800) 23:09:50 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:09:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 48) [ 2752.206454] loop3: detected capacity change from 0 to 135266304 [ 2752.228454] tmpfs: Bad value for 'mpol' 23:09:50 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10002, 0x1b0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) 23:09:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:09:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3100, 0x4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@euid_lt}, {@uid_gt={'uid>', r2}}, {@euid_gt={'euid>', r3}}]}}) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200040, 0x100) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2752.299247] FAULT_INJECTION: forcing a failure. [ 2752.299247] name failslab, interval 1, probability 0, space 0, times 0 [ 2752.301870] CPU: 0 PID: 12831 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2752.303264] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2752.304937] Call Trace: [ 2752.305477] dump_stack+0x107/0x167 [ 2752.306208] should_fail.cold+0x5/0xa [ 2752.306985] should_failslab+0x5/0x20 [ 2752.307764] __kmalloc_track_caller+0x79/0x370 [ 2752.308680] ? kasprintf+0xbb/0xf0 [ 2752.309399] ? __delete_object+0xb3/0x100 [ 2752.310231] kvasprintf+0xb5/0x150 [ 2752.310947] ? bust_spinlocks+0xe0/0xe0 [ 2752.311748] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2752.312808] kasprintf+0xbb/0xf0 [ 2752.313499] ? kvasprintf_const+0x1a0/0x1a0 [ 2752.314367] ? kmem_cache_free+0x249/0x2d0 [ 2752.315229] ? p9_client_create+0xbfa/0x1230 [ 2752.316119] p9_client_create+0xc1b/0x1230 [ 2752.316974] ? p9_client_flush+0x430/0x430 [ 2752.317833] ? trace_hardirqs_on+0x5b/0x180 [ 2752.318707] ? lockdep_init_map_type+0x2c7/0x780 [ 2752.319658] ? __raw_spin_lock_init+0x36/0x110 [ 2752.320583] v9fs_session_init+0x1dd/0x1680 [ 2752.321460] ? lock_release+0x680/0x680 [ 2752.322267] ? kmem_cache_alloc_trace+0x151/0x320 [ 2752.323298] ? v9fs_show_options+0x690/0x690 [ 2752.324190] ? trace_hardirqs_on+0x5b/0x180 [ 2752.325058] ? kasan_unpoison_shadow+0x33/0x50 [ 2752.325985] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2752.326996] v9fs_mount+0x79/0x8f0 [ 2752.327703] ? v9fs_write_inode+0x60/0x60 [ 2752.328529] legacy_get_tree+0x105/0x220 [ 2752.329344] vfs_get_tree+0x8e/0x300 [ 2752.330079] path_mount+0x1429/0x2120 [ 2752.330845] ? strncpy_from_user+0x9e/0x470 [ 2752.331702] ? finish_automount+0xa90/0xa90 [ 2752.332554] ? getname_flags.part.0+0x1dd/0x4f0 [ 2752.333490] ? _copy_from_user+0xfb/0x1b0 [ 2752.334316] __x64_sys_mount+0x282/0x300 [ 2752.335158] ? copy_mnt_ns+0xa00/0xa00 [ 2752.336097] do_syscall_64+0x33/0x40 [ 2752.336845] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2752.337881] RIP: 0033:0x7ff784b43b19 [ 2752.338627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2752.342313] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2752.343843] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2752.345269] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2752.346704] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2752.348136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2752.349572] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:10:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 49) 23:10:10 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:10:10 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:10:10 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3875, &(0x7f00000001c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r3, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, r2, &(0x7f0000000240)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000180)=0x80, &(0x7f00000001c0)=@qipcrtr, 0x0, 0x800, 0x1}, 0x200) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) 23:10:10 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x40600, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x40, 0x2, 0x400}, 0xfffffffc}}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:10:10 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:10:10 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0x0, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:10:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2772.695447] FAULT_INJECTION: forcing a failure. [ 2772.695447] name failslab, interval 1, probability 0, space 0, times 0 [ 2772.697930] CPU: 0 PID: 12854 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2772.699404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2772.701160] Call Trace: [ 2772.701720] dump_stack+0x107/0x167 [ 2772.702574] should_fail.cold+0x5/0xa [ 2772.703390] ? create_object.isra.0+0x3a/0xa20 [ 2772.704362] should_failslab+0x5/0x20 [ 2772.705201] kmem_cache_alloc+0x5b/0x310 [ 2772.706087] ? vsnprintf+0x4ba/0x1600 [ 2772.706895] create_object.isra.0+0x3a/0xa20 [ 2772.707831] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2772.709095] __kmalloc_track_caller+0x177/0x370 [ 2772.710092] ? kasprintf+0xbb/0xf0 [ 2772.710850] kvasprintf+0xb5/0x150 [ 2772.711599] ? bust_spinlocks+0xe0/0xe0 [ 2772.712441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2772.713563] kasprintf+0xbb/0xf0 [ 2772.714284] ? kvasprintf_const+0x1a0/0x1a0 [ 2772.715203] ? kmem_cache_free+0x249/0x2d0 [ 2772.716104] ? p9_client_create+0xbfa/0x1230 [ 2772.717046] p9_client_create+0xc1b/0x1230 [ 2772.717982] ? p9_client_flush+0x430/0x430 [ 2772.718891] ? trace_hardirqs_on+0x5b/0x180 [ 2772.719803] ? lockdep_init_map_type+0x2c7/0x780 [ 2772.720803] ? __raw_spin_lock_init+0x36/0x110 [ 2772.721776] v9fs_session_init+0x1dd/0x1680 [ 2772.722705] ? lock_release+0x680/0x680 [ 2772.723553] ? kmem_cache_alloc_trace+0x151/0x320 [ 2772.724569] ? v9fs_show_options+0x690/0x690 [ 2772.725508] ? trace_hardirqs_on+0x5b/0x180 [ 2772.726427] ? kasan_unpoison_shadow+0x33/0x50 [ 2772.727391] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2772.728467] v9fs_mount+0x79/0x8f0 [ 2772.729215] ? v9fs_write_inode+0x60/0x60 [ 2772.730100] legacy_get_tree+0x105/0x220 [ 2772.730955] vfs_get_tree+0x8e/0x300 [ 2772.731737] path_mount+0x1429/0x2120 [ 2772.732543] ? strncpy_from_user+0x9e/0x470 [ 2772.733454] ? finish_automount+0xa90/0xa90 [ 2772.734375] ? getname_flags.part.0+0x1dd/0x4f0 [ 2772.735356] ? _copy_from_user+0xfb/0x1b0 [ 2772.736378] __x64_sys_mount+0x282/0x300 [ 2772.737236] ? copy_mnt_ns+0xa00/0xa00 [ 2772.738074] do_syscall_64+0x33/0x40 [ 2772.738859] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2772.739937] RIP: 0033:0x7ff784b43b19 [ 2772.740728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2772.744669] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2772.746290] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2772.747801] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2772.749313] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2772.750830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2772.752336] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2772.798564] loop3: detected capacity change from 0 to 135266304 [ 2772.842759] tmpfs: Bad value for 'mpol' 23:10:11 executing program 1: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f00000003c0)={0x1, 0x6, 0x1000, 0xb4, &(0x7f0000000300)="3cf9759eae8a547d7d9f52fdc31726557586465ed7128caa354508e3b6d2be7551e6bf2259675ead81ad86694586e83df7e8ec838ab6e52902dd6f93d1c637c6a46f8283d85c4364fbde441106f03754d918cc1038068018ebf97511148bf4072057a754383dcb50b1f0a03346d8a8a4e26bd4b2a51c804f6f6234b01d979bea0f2ec51b29d6f4cb82fa31dcbd8fa8ff0911d39c44e4c99e80c230d860d6893a662e2906d88a3fc27d6b5e1766a2cd79a0ddea8e", 0xe2, 0x0, &(0x7f00000014c0)="e502ef5aca2f51ea546a38bc5b9049b32f199f6f1e1015ad8d9adb5591aaf98f189796bbe5734795742672e8437cf68d57ed8923477fa3b1f08e4994b98d6570eabe111b61dc7fae5a251e1fb237b7c7ce1e7ffed8e3d699130a08c5c4b9e697e32ba5bfff661a2f4099d87ef9f4d885aba08e363afac1c226cf3fbc576ea6c73f8db170b7d3578621192281e5a2826685db93fe0b0511d6a0703e120a9701588d7406a566621bc3831c493c8831a3a48a798c4a979cf22b4d32507b81763a1083ef094a14d8d6300334869e4bd0309bd7100e8e314835cadca9bfadae5bc372e478"}) setsockopt$inet6_int(r4, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r4, 0x50009417, &(0x7f00000004c0)={{r0}, 0x0, 0xc, @inherit={0x48, &(0x7f0000000200)={0x1, 0x0, 0x81, 0xffffffff, {0x0, 0x100000001, 0x5, 0x401}}}, @devid}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x6a}, @val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x1f, 0x43}}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24000004}, 0x20040000) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) 23:10:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:10:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 50) [ 2773.192592] loop3: detected capacity change from 0 to 135266304 [ 2773.245540] tmpfs: Bad value for 'mpol' 23:10:11 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x7, 0x20, 0x1f, 0xfd, 0x0, 0xfffffffffffffffa, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x1000, 0x2}, 0x4, 0x3, 0x8, 0x6, 0x3, 0x5, 0x508, 0x0, 0x9, 0x0, 0xd5d}, r0, 0x6, 0xffffffffffffffff, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) [ 2773.263213] FAULT_INJECTION: forcing a failure. [ 2773.263213] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.266061] CPU: 0 PID: 12878 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2773.267507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2773.269229] Call Trace: [ 2773.269778] dump_stack+0x107/0x167 [ 2773.270546] should_fail.cold+0x5/0xa [ 2773.271350] should_failslab+0x5/0x20 [ 2773.272144] __kmalloc_track_caller+0x79/0x370 [ 2773.273092] ? kstrdup_const+0x53/0x80 [ 2773.273901] ? kasprintf+0xbb/0xf0 [ 2773.274725] kstrdup+0x36/0x70 [ 2773.275397] kstrdup_const+0x53/0x80 [ 2773.276176] kmem_cache_create_usercopy+0x12f/0x2f0 [ 2773.277230] p9_client_create+0xc6a/0x1230 [ 2773.278131] ? p9_client_flush+0x430/0x430 [ 2773.279019] ? trace_hardirqs_on+0x5b/0x180 [ 2773.279921] ? lockdep_init_map_type+0x2c7/0x780 [ 2773.280911] ? __raw_spin_lock_init+0x36/0x110 [ 2773.281874] v9fs_session_init+0x1dd/0x1680 [ 2773.282782] ? lock_release+0x680/0x680 [ 2773.283619] ? kmem_cache_alloc_trace+0x151/0x320 [ 2773.284628] ? v9fs_show_options+0x690/0x690 [ 2773.285559] ? trace_hardirqs_on+0x5b/0x180 [ 2773.286467] ? kasan_unpoison_shadow+0x33/0x50 [ 2773.287442] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2773.288570] v9fs_mount+0x79/0x8f0 [ 2773.289315] ? v9fs_write_inode+0x60/0x60 [ 2773.290197] legacy_get_tree+0x105/0x220 [ 2773.291062] vfs_get_tree+0x8e/0x300 [ 2773.291844] path_mount+0x1429/0x2120 [ 2773.292642] ? strncpy_from_user+0x9e/0x470 [ 2773.293540] ? finish_automount+0xa90/0xa90 [ 2773.294451] ? getname_flags.part.0+0x1dd/0x4f0 [ 2773.295417] ? _copy_from_user+0xfb/0x1b0 [ 2773.296290] __x64_sys_mount+0x282/0x300 [ 2773.297131] ? copy_mnt_ns+0xa00/0xa00 [ 2773.297973] do_syscall_64+0x33/0x40 [ 2773.298758] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2773.299824] RIP: 0033:0x7ff784b43b19 [ 2773.300604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2773.304464] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2773.306062] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2773.307552] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2773.309039] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2773.310529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2773.312020] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2773.313600] kmem_cache_create(9p-fcall-cache-347) failed with error -12 [ 2773.315026] CPU: 0 PID: 12878 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2773.316474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2773.318234] Call Trace: [ 2773.318781] dump_stack+0x107/0x167 [ 2773.319594] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2773.320904] p9_client_create+0xc6a/0x1230 [ 2773.321796] ? p9_client_flush+0x430/0x430 [ 2773.322690] ? trace_hardirqs_on+0x5b/0x180 [ 2773.323594] ? lockdep_init_map_type+0x2c7/0x780 [ 2773.324577] ? __raw_spin_lock_init+0x36/0x110 [ 2773.325583] v9fs_session_init+0x1dd/0x1680 [ 2773.326493] ? lock_release+0x680/0x680 [ 2773.327329] ? kmem_cache_alloc_trace+0x151/0x320 [ 2773.328330] ? v9fs_show_options+0x690/0x690 [ 2773.329253] ? trace_hardirqs_on+0x5b/0x180 [ 2773.330159] ? kasan_unpoison_shadow+0x33/0x50 [ 2773.331108] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2773.332164] v9fs_mount+0x79/0x8f0 [ 2773.332904] ? v9fs_write_inode+0x60/0x60 [ 2773.333765] legacy_get_tree+0x105/0x220 [ 2773.334628] vfs_get_tree+0x8e/0x300 [ 2773.335401] path_mount+0x1429/0x2120 [ 2773.336204] ? strncpy_from_user+0x9e/0x470 [ 2773.337106] ? finish_automount+0xa90/0xa90 [ 2773.338003] ? getname_flags.part.0+0x1dd/0x4f0 [ 2773.338985] ? _copy_from_user+0xfb/0x1b0 [ 2773.339849] __x64_sys_mount+0x282/0x300 [ 2773.340691] ? copy_mnt_ns+0xa00/0xa00 [ 2773.341511] do_syscall_64+0x33/0x40 [ 2773.342295] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2773.343366] RIP: 0033:0x7ff784b43b19 [ 2773.344139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2773.347986] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2773.349577] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2773.351081] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2773.352564] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2773.354061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2773.355553] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:10:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:10:11 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0x0, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:10:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f00000003c0)={0x6aac, {{0xa, 0x4e24, 0x7, @rand_addr=' \x01\x00', 0x7}}}, 0x88) setsockopt$inet6_int(r2, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) r4 = open_tree(0xffffffffffffff9c, &(0x7f00000005c0)='./file1\x00', 0x80800) ioctl$SCSI_IOCTL_DOORUNLOCK(r4, 0x5381) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0/../file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000580)={{0x1, 0x1, 0x18, r5, {0xee01}}, './file0\x00'}) 23:10:11 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) [ 2773.678724] loop3: detected capacity change from 0 to 135266304 [ 2773.687583] tmpfs: Bad value for 'mpol' 23:10:11 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1, 0xe6, 0x7, 0x20, 0x0, 0x2, 0x80d11, 0x7, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf24a, 0x0, @perf_config_ext={0x0, 0x89}, 0xa201, 0x0, 0x80000001, 0x5, 0x80, 0x7, 0x7, 0x0, 0xf11, 0x0, 0x100000001}, r3, 0x9, r1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0xb7e7b) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) 23:10:11 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:10:11 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:10:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 51) [ 2773.866248] FAULT_INJECTION: forcing a failure. [ 2773.866248] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.868599] CPU: 0 PID: 12905 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2773.869993] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2773.871665] Call Trace: [ 2773.872195] dump_stack+0x107/0x167 [ 2773.872940] should_fail.cold+0x5/0xa [ 2773.873713] should_failslab+0x5/0x20 [ 2773.874494] __kmalloc_track_caller+0x79/0x370 [ 2773.875422] ? kstrdup_const+0x53/0x80 [ 2773.876218] ? kasprintf+0xbb/0xf0 [ 2773.876945] kstrdup+0x36/0x70 [ 2773.877608] kstrdup_const+0x53/0x80 [ 2773.878393] kmem_cache_create_usercopy+0x12f/0x2f0 [ 2773.879419] p9_client_create+0xc6a/0x1230 [ 2773.880296] ? p9_client_flush+0x430/0x430 [ 2773.881152] ? trace_hardirqs_on+0x5b/0x180 [ 2773.882114] ? lockdep_init_map_type+0x2c7/0x780 [ 2773.883106] ? __raw_spin_lock_init+0x36/0x110 [ 2773.884051] v9fs_session_init+0x1dd/0x1680 [ 2773.884937] ? lock_release+0x680/0x680 [ 2773.885739] ? kmem_cache_alloc_trace+0x151/0x320 [ 2773.886714] ? v9fs_show_options+0x690/0x690 [ 2773.887597] ? trace_hardirqs_on+0x5b/0x180 [ 2773.888457] ? kasan_unpoison_shadow+0x33/0x50 [ 2773.889375] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2773.890392] v9fs_mount+0x79/0x8f0 [ 2773.891095] ? v9fs_write_inode+0x60/0x60 [ 2773.891908] legacy_get_tree+0x105/0x220 [ 2773.892742] vfs_get_tree+0x8e/0x300 [ 2773.893497] path_mount+0x1429/0x2120 [ 2773.894279] ? strncpy_from_user+0x9e/0x470 [ 2773.895172] ? finish_automount+0xa90/0xa90 [ 2773.896040] ? getname_flags.part.0+0x1dd/0x4f0 [ 2773.896967] ? _copy_from_user+0xfb/0x1b0 [ 2773.897807] __x64_sys_mount+0x282/0x300 [ 2773.898629] ? copy_mnt_ns+0xa00/0xa00 [ 2773.899425] do_syscall_64+0x33/0x40 [ 2773.900181] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2773.901202] RIP: 0033:0x7ff784b43b19 [ 2773.901952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2773.905627] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2773.907420] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2773.908845] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2773.910265] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2773.911693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2773.913118] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2773.914722] kmem_cache_create(9p-fcall-cache-349) failed with error -12 [ 2773.916096] CPU: 0 PID: 12905 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2773.917470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2773.919127] Call Trace: [ 2773.919661] dump_stack+0x107/0x167 [ 2773.920405] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2773.921470] p9_client_create+0xc6a/0x1230 [ 2773.922330] ? p9_client_flush+0x430/0x430 [ 2773.923172] ? trace_hardirqs_on+0x5b/0x180 [ 2773.924043] ? lockdep_init_map_type+0x2c7/0x780 [ 2773.924987] ? __raw_spin_lock_init+0x36/0x110 [ 2773.925906] v9fs_session_init+0x1dd/0x1680 [ 2773.926784] ? lock_release+0x680/0x680 [ 2773.927588] ? kmem_cache_alloc_trace+0x151/0x320 [ 2773.928552] ? v9fs_show_options+0x690/0x690 [ 2773.929437] ? trace_hardirqs_on+0x5b/0x180 [ 2773.930316] ? kasan_unpoison_shadow+0x33/0x50 [ 2773.931461] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2773.932484] v9fs_mount+0x79/0x8f0 [ 2773.933203] ? v9fs_write_inode+0x60/0x60 [ 2773.934046] legacy_get_tree+0x105/0x220 [ 2773.934880] vfs_get_tree+0x8e/0x300 [ 2773.935631] path_mount+0x1429/0x2120 [ 2773.936399] ? strncpy_from_user+0x9e/0x470 [ 2773.937259] ? finish_automount+0xa90/0xa90 [ 2773.938127] ? getname_flags.part.0+0x1dd/0x4f0 [ 2773.939061] ? _copy_from_user+0xfb/0x1b0 [ 2773.939891] __x64_sys_mount+0x282/0x300 [ 2773.940701] ? copy_mnt_ns+0xa00/0xa00 [ 2773.941498] do_syscall_64+0x33/0x40 [ 2773.942262] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2773.943289] RIP: 0033:0x7ff784b43b19 [ 2773.944046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2773.947719] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2773.949246] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2773.950680] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2773.952102] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2773.953524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2773.954943] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:10:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001f0021faf706000000000000040002008035439b15b924e12247c81d0dba2764ad81b246f10024ab326c5bf63c179d6cc2c0738632751dcb03dcda7002dd464c2e034bbed95b0934f74690da1e1de29a005c3a572343c6102d26d567c7680173dd535bc6"], 0x14}}, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup(r2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r4, 0x325, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r4, 0x100, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x1, 0x8}}}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r2) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r5, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x840) 23:10:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:10:31 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:10:31 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:10:31 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x1, 0xe6, 0x7, 0x20, 0x0, 0x2, 0x80d11, 0x7, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xf24a, 0x0, @perf_config_ext={0x0, 0x89}, 0xa201, 0x0, 0x80000001, 0x5, 0x80, 0x7, 0x7, 0x0, 0xf11, 0x0, 0x100000001}, r3, 0x9, r1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0xb7e7b) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) 23:10:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 52) 23:10:31 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:10:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c40060000005f"]) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2793.515712] FAULT_INJECTION: forcing a failure. [ 2793.515712] name failslab, interval 1, probability 0, space 0, times 0 [ 2793.518367] CPU: 1 PID: 12928 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2793.519936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2793.521810] Call Trace: [ 2793.522408] dump_stack+0x107/0x167 [ 2793.523243] should_fail.cold+0x5/0xa [ 2793.524111] ? create_object.isra.0+0x3a/0xa20 [ 2793.525142] should_failslab+0x5/0x20 [ 2793.526005] kmem_cache_alloc+0x5b/0x310 [ 2793.526937] create_object.isra.0+0x3a/0xa20 [ 2793.527926] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2793.529081] kmem_cache_alloc+0x159/0x310 [ 2793.530027] kmem_cache_create_usercopy+0x190/0x2f0 [ 2793.531316] p9_client_create+0xc6a/0x1230 [ 2793.532389] ? p9_client_flush+0x430/0x430 [ 2793.533343] ? trace_hardirqs_on+0x5b/0x180 [ 2793.534315] ? lockdep_init_map_type+0x2c7/0x780 [ 2793.535392] ? __raw_spin_lock_init+0x36/0x110 [ 2793.536437] v9fs_session_init+0x1dd/0x1680 [ 2793.537405] ? lock_release+0x680/0x680 [ 2793.538317] ? kmem_cache_alloc_trace+0x151/0x320 [ 2793.539412] ? v9fs_show_options+0x690/0x690 [ 2793.540416] ? trace_hardirqs_on+0x5b/0x180 [ 2793.541390] ? kasan_unpoison_shadow+0x33/0x50 [ 2793.542669] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2793.543826] v9fs_mount+0x79/0x8f0 [ 2793.544622] ? v9fs_write_inode+0x60/0x60 [ 2793.545552] legacy_get_tree+0x105/0x220 [ 2793.546463] vfs_get_tree+0x8e/0x300 [ 2793.547309] path_mount+0x1429/0x2120 [ 2793.548170] ? strncpy_from_user+0x9e/0x470 [ 2793.549140] ? finish_automount+0xa90/0xa90 [ 2793.550107] ? getname_flags.part.0+0x1dd/0x4f0 [ 2793.551159] ? _copy_from_user+0xfb/0x1b0 [ 2793.552111] __x64_sys_mount+0x282/0x300 [ 2793.553023] ? copy_mnt_ns+0xa00/0xa00 [ 2793.553915] do_syscall_64+0x33/0x40 [ 2793.554751] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2793.555915] RIP: 0033:0x7ff784b43b19 [ 2793.556758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2793.560914] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2793.562674] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2793.564258] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2793.565770] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2793.567295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2793.568788] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:10:31 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) [ 2793.655247] loop3: detected capacity change from 0 to 135266304 23:10:31 executing program 4: ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x3, 0x7}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = getpgrp(r0) ioprio_get$pid(0x0, r1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) close(r4) perf_event_open(&(0x7f0000000000)={0x7, 0x80, 0x7, 0x1, 0x3e, 0x4, 0x0, 0xffffffffffff8001, 0x10700, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xc66, 0x2, @perf_config_ext={0x8, 0xfffffffffffff800}, 0x89404, 0x80000001, 0xffffff07, 0x5, 0x20, 0x2, 0x4, 0x0, 0xffff0000, 0x0, 0x9}, r0, 0x2, r2, 0x8) fstatfs(r3, &(0x7f00000000c0)=""/3) chdir(0x0) [ 2793.674311] tmpfs: Bad value for 'mpol' 23:10:51 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:10:51 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:10:51 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:10:51 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {0x0, r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "46da9200"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000004c0)={{r4, 0x4, 0x4, 0x3, 0x8, 0x8016, 0x0, 0xd96f, 0x8, 0x1, 0x3, 0x3f, 0x9, 0x4, 0x3}}) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = getpid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x7, 0x9, 0x4, 0x0, 0xfffffffffffffe01, 0x20, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0xa0, 0x0, 0xc603, 0x3, 0x2, 0xffffffff, 0x5, 0x0, 0x4, 0x0, 0x400}, r7, 0x10, r6, 0xc78270a72a8775b7) ioctl$MON_IOCX_MFETCH(r5, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r6, &(0x7f0000000040)={0xa6e320ba6884e8fb}) 23:10:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:10:51 executing program 4: ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000080)={0x1, 0x3, 0x7}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = getpgrp(r0) ioprio_get$pid(0x0, r1) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) close(r4) perf_event_open(&(0x7f0000000000)={0x7, 0x80, 0x7, 0x1, 0x3e, 0x4, 0x0, 0xffffffffffff8001, 0x10700, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xc66, 0x2, @perf_config_ext={0x8, 0xfffffffffffff800}, 0x89404, 0x80000001, 0xffffff07, 0x5, 0x20, 0x2, 0x4, 0x0, 0xffff0000, 0x0, 0x9}, r0, 0x2, r2, 0x8) fstatfs(r3, &(0x7f00000000c0)=""/3) chdir(0x0) 23:10:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 53) 23:10:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB, @ANYRESHEX=r3, @ANYBLOB=',\x00']) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r4, 0xffffffffffffffff, 0x0) open_by_handle_at(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070517a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f79fb77689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0b7e48d66203f38287876724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a27ffd74255ef37a"], 0x420800) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4, {r5, 0xffffffffffffffff}}, './file0\x00'}) [ 2813.449298] FAULT_INJECTION: forcing a failure. [ 2813.449298] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.452389] CPU: 0 PID: 12959 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2813.453787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.455482] Call Trace: [ 2813.456026] dump_stack+0x107/0x167 [ 2813.456806] should_fail.cold+0x5/0xa [ 2813.457589] ? __kmem_cache_create+0x10e/0x520 [ 2813.458527] should_failslab+0x5/0x20 [ 2813.459299] kmem_cache_alloc_node+0x55/0x330 [ 2813.460298] __kmem_cache_create+0x10e/0x520 [ 2813.461244] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2813.462294] p9_client_create+0xc6a/0x1230 [ 2813.463212] ? p9_client_flush+0x430/0x430 [ 2813.464125] ? trace_hardirqs_on+0x5b/0x180 [ 2813.465050] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.466071] ? __raw_spin_lock_init+0x36/0x110 [ 2813.467055] v9fs_session_init+0x1dd/0x1680 [ 2813.467983] ? lock_release+0x680/0x680 [ 2813.468828] ? kmem_cache_alloc_trace+0x151/0x320 [ 2813.469841] ? v9fs_show_options+0x690/0x690 [ 2813.470772] ? trace_hardirqs_on+0x5b/0x180 [ 2813.471692] ? kasan_unpoison_shadow+0x33/0x50 [ 2813.472626] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2813.473760] v9fs_mount+0x79/0x8f0 [ 2813.474503] ? v9fs_write_inode+0x60/0x60 [ 2813.475370] legacy_get_tree+0x105/0x220 [ 2813.476242] vfs_get_tree+0x8e/0x300 [ 2813.477030] path_mount+0x1429/0x2120 [ 2813.477841] ? strncpy_from_user+0x9e/0x470 [ 2813.478744] ? finish_automount+0xa90/0xa90 [ 2813.479660] ? getname_flags.part.0+0x1dd/0x4f0 [ 2813.480646] ? _copy_from_user+0xfb/0x1b0 [ 2813.481520] __x64_sys_mount+0x282/0x300 [ 2813.482368] ? copy_mnt_ns+0xa00/0xa00 [ 2813.483188] do_syscall_64+0x33/0x40 [ 2813.483973] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2813.485033] RIP: 0033:0x7ff784b43b19 [ 2813.485812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.489643] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2813.491223] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2813.492710] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2813.494178] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2813.495674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2813.497159] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2813.498856] kmem_cache_create(9p-fcall-cache-353) failed with error -22 [ 2813.500340] CPU: 0 PID: 12959 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2813.501775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.503488] Call Trace: [ 2813.504044] dump_stack+0x107/0x167 [ 2813.504814] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2813.505915] p9_client_create+0xc6a/0x1230 [ 2813.506821] ? p9_client_flush+0x430/0x430 [ 2813.507711] ? trace_hardirqs_on+0x5b/0x180 [ 2813.508611] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.509588] ? __raw_spin_lock_init+0x36/0x110 [ 2813.510802] v9fs_session_init+0x1dd/0x1680 [ 2813.511699] ? lock_release+0x680/0x680 [ 2813.512536] ? kmem_cache_alloc_trace+0x151/0x320 [ 2813.513536] ? v9fs_show_options+0x690/0x690 [ 2813.514461] ? trace_hardirqs_on+0x5b/0x180 [ 2813.515365] ? kasan_unpoison_shadow+0x33/0x50 [ 2813.516331] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2813.517381] v9fs_mount+0x79/0x8f0 [ 2813.518122] ? v9fs_write_inode+0x60/0x60 [ 2813.518983] legacy_get_tree+0x105/0x220 [ 2813.519840] vfs_get_tree+0x8e/0x300 [ 2813.520614] path_mount+0x1429/0x2120 [ 2813.521409] ? strncpy_from_user+0x9e/0x470 [ 2813.522351] ? finish_automount+0xa90/0xa90 [ 2813.523256] ? getname_flags.part.0+0x1dd/0x4f0 [ 2813.524249] ? _copy_from_user+0xfb/0x1b0 [ 2813.525118] __x64_sys_mount+0x282/0x300 [ 2813.525956] ? copy_mnt_ns+0xa00/0xa00 [ 2813.526771] do_syscall_64+0x33/0x40 [ 2813.527561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2813.528627] RIP: 0033:0x7ff784b43b19 [ 2813.529391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.533226] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2813.534794] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2813.536273] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2813.537737] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2813.539229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2813.540720] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2813.556585] 9pnet: Insufficient options for proto=fd [ 2813.565373] loop3: detected capacity change from 0 to 135266304 [ 2813.575599] tmpfs: Unsupported parameter 'huge' 23:10:51 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:10:51 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:10:51 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2813.674467] 9pnet: Insufficient options for proto=fd 23:10:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 54) 23:10:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:10:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x81, 0x8, 0x9, 0x0, 0x4, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x5, 0xda3}, 0x140, 0x7, 0x81, 0x2, 0x2, 0x8, 0x1ff, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x5, 0x5, 0x1, 0x81, 0x0, 0x0, 0x40, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x100000000, 0x7eb3}, 0xc00, 0x80000000, 0x9f, 0x4, 0xffffffff, 0x7, 0x1c, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x9, r0, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:10:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) [ 2813.929391] FAULT_INJECTION: forcing a failure. [ 2813.929391] name failslab, interval 1, probability 0, space 0, times 0 [ 2813.932367] CPU: 1 PID: 12979 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2813.934136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2813.936288] Call Trace: [ 2813.937087] dump_stack+0x107/0x167 [ 2813.938136] should_fail.cold+0x5/0xa [ 2813.939100] ? create_object.isra.0+0x3a/0xa20 [ 2813.940275] should_failslab+0x5/0x20 [ 2813.941235] kmem_cache_alloc+0x5b/0x310 [ 2813.942270] create_object.isra.0+0x3a/0xa20 [ 2813.943382] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2813.944683] kmem_cache_alloc_node+0x169/0x330 [ 2813.945844] __kmem_cache_create+0x10e/0x520 [ 2813.946964] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2813.948231] p9_client_create+0xc6a/0x1230 [ 2813.949125] ? p9_client_flush+0x430/0x430 [ 2813.949997] ? trace_hardirqs_on+0x5b/0x180 [ 2813.950890] ? lockdep_init_map_type+0x2c7/0x780 [ 2813.951887] ? __raw_spin_lock_init+0x36/0x110 [ 2813.952843] v9fs_session_init+0x1dd/0x1680 [ 2813.953732] ? lock_release+0x680/0x680 [ 2813.954559] ? kmem_cache_alloc_trace+0x151/0x320 [ 2813.955575] ? v9fs_show_options+0x690/0x690 [ 2813.956501] ? trace_hardirqs_on+0x5b/0x180 [ 2813.957396] ? kasan_unpoison_shadow+0x33/0x50 [ 2813.958336] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2813.959389] v9fs_mount+0x79/0x8f0 [ 2813.960129] ? v9fs_write_inode+0x60/0x60 [ 2813.960991] legacy_get_tree+0x105/0x220 [ 2813.961900] vfs_get_tree+0x8e/0x300 [ 2813.962681] path_mount+0x1429/0x2120 [ 2813.963501] ? strncpy_from_user+0x9e/0x470 [ 2813.964398] ? finish_automount+0xa90/0xa90 [ 2813.965295] ? getname_flags.part.0+0x1dd/0x4f0 [ 2813.966250] ? _copy_from_user+0xfb/0x1b0 [ 2813.967115] __x64_sys_mount+0x282/0x300 [ 2813.967963] ? copy_mnt_ns+0xa00/0xa00 [ 2813.968774] do_syscall_64+0x33/0x40 [ 2813.969554] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2813.970608] RIP: 0033:0x7ff784b43b19 [ 2813.971386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2813.975208] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2813.976799] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2813.978280] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2813.979766] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2813.981259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2813.982743] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:10:52 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) [ 2814.052169] loop3: detected capacity change from 0 to 135266304 [ 2814.064523] tmpfs: Unsupported parameter 'huge' 23:11:10 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:11:10 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:11:10 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400ff0700cafa5d61e02d7b3b0566cffd37478ba471d1502ef4ae345eff063dfb78aa0a1bf1ca46a92e78558b7c5772ad067d0584567eb3b2d9ecf02c1da780e515a3ea05d4532d9e6a39ddfbfef765e7dce8a0b21711119881017cac81f342a0c0e979a43a93e913937f9803ae6c6f7349344a044f02fd745db5ab66cf4196aacc634433b15b87e816f2614cc24f645e36ee45008ff38d04b5f5f0d3cfd27c7d35dffafe7bf089bcacc29efaa3e43f1b6b4bb11e91d2c06d3dff3eef19e366816473bee36bae55ef5032b3e048bc93f324e5466702c7ca2e512d8a9452cc2dbb5ac0d05ce41a"], 0x14}}, 0x0) 23:11:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 55) 23:11:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:11:10 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:11:11 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:11:11 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x5) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setresuid(0xee00, 0xee00, 0xee01) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={0x0, @hci, @sco, @xdp}) bind(r2, &(0x7f0000000200)=@un=@file={0x0, './file0/../file0\x00'}, 0x80) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r5, 0xffffffffffffffff, 0x0) open_by_handle_at(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="9692c7bc0600000000000000d6bb329cd6ee2228a63ec0f878ae23111645ce14a3070517a9177f78bed4c4251ed506652bc5b682a24a8f40afca262b1b07a7633fa8141c3e752b92fbd3db7bdd1bdb586420bbdd2a1ef9e6262b95650f79fb77689b238a52992177dc911fe4027cc3e0af88c4460a61a45ad22bb5c1b16d2c0576201b66e23f9ee3decc4a9f4bdecde768fdaf30d6a2d516bc2a10afd3b43d5b952b506980c2e0b7e48d66203f38287876724457de69d1db88e6efeb7d32d388f5955939ace04ebc9e730d30d8361c24aad31df837d07753fd4f1652516f3ddb52b33724a27ffd74255ef37a"], 0x420800) ppoll(&(0x7f0000000000)=[{r2}, {r3, 0x400}, {r5, 0x4004}, {r0, 0x440}], 0x4, &(0x7f0000000080), &(0x7f0000000100)={[0x8]}, 0x8) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2832.693702] FAULT_INJECTION: forcing a failure. [ 2832.693702] name failslab, interval 1, probability 0, space 0, times 0 [ 2832.696220] CPU: 0 PID: 13004 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2832.697685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2832.699435] Call Trace: [ 2832.699995] dump_stack+0x107/0x167 [ 2832.700766] should_fail.cold+0x5/0xa [ 2832.701572] ? create_object.isra.0+0x3a/0xa20 [ 2832.702530] should_failslab+0x5/0x20 [ 2832.703326] kmem_cache_alloc+0x5b/0x310 [ 2832.704196] create_object.isra.0+0x3a/0xa20 [ 2832.705132] kmemleak_alloc_percpu+0xa0/0x100 [ 2832.706069] pcpu_alloc+0x4e2/0x1240 [ 2832.706866] __kmem_cache_create+0x35a/0x520 [ 2832.707794] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2832.708863] p9_client_create+0xc6a/0x1230 [ 2832.709760] ? p9_client_flush+0x430/0x430 [ 2832.710636] ? trace_hardirqs_on+0x5b/0x180 [ 2832.711537] ? lockdep_init_map_type+0x2c7/0x780 [ 2832.712531] ? __raw_spin_lock_init+0x36/0x110 [ 2832.713484] v9fs_session_init+0x1dd/0x1680 [ 2832.714391] ? lock_release+0x680/0x680 [ 2832.715237] ? kmem_cache_alloc_trace+0x151/0x320 [ 2832.716262] ? v9fs_show_options+0x690/0x690 [ 2832.717196] ? trace_hardirqs_on+0x5b/0x180 [ 2832.718092] ? kasan_unpoison_shadow+0x33/0x50 [ 2832.719046] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2832.720098] v9fs_mount+0x79/0x8f0 [ 2832.720909] ? v9fs_write_inode+0x60/0x60 [ 2832.721775] legacy_get_tree+0x105/0x220 [ 2832.722620] vfs_get_tree+0x8e/0x300 [ 2832.723396] path_mount+0x1429/0x2120 [ 2832.724212] ? strncpy_from_user+0x9e/0x470 [ 2832.725107] ? finish_automount+0xa90/0xa90 [ 2832.726006] ? getname_flags.part.0+0x1dd/0x4f0 [ 2832.726971] ? _copy_from_user+0xfb/0x1b0 [ 2832.727851] __x64_sys_mount+0x282/0x300 [ 2832.728750] ? copy_mnt_ns+0xa00/0xa00 [ 2832.729720] do_syscall_64+0x33/0x40 [ 2832.730493] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2832.731557] RIP: 0033:0x7ff784b43b19 [ 2832.732356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2832.736239] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2832.737837] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2832.739322] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2832.740807] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2832.742289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2832.743759] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2832.790474] loop3: detected capacity change from 0 to 135266304 [ 2832.797269] tmpfs: Unsupported parameter 'huge' 23:11:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2833.075351] loop3: detected capacity change from 0 to 135266304 23:11:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c00938a1a6b41b63088b7b4dbc083189f330fec682a4433658a157d6560963220a51ef2b923e427522d32b96b06b1f7e9373a1c100478da00f4c3312942a0b57eb7292e0a929eb1a45e2467af4596a30ddce3b657f139fc04c2b2e434e61ebf2de0d5a122f2e272b3793cbc46da75e1b726f5389a4fb5da43048a49f8be03af6863dc6682923e872df8db0d882a038343b2606f33bf0c6539773db0880c44ec088444e344029197039aaa8e61764dbd8b6de9abba3cde1d159dc16ccbf09a3f02ddfafcd657"]) utime(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)={0x4, 0x7fff}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2833.095491] tmpfs: Bad value for 'mpol' 23:11:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:11:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 56) [ 2833.376342] FAULT_INJECTION: forcing a failure. [ 2833.376342] name failslab, interval 1, probability 0, space 0, times 0 [ 2833.379008] CPU: 1 PID: 13030 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2833.380517] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2833.382475] Call Trace: [ 2833.383047] dump_stack+0x107/0x167 [ 2833.383823] should_fail.cold+0x5/0xa [ 2833.384643] ? create_object.isra.0+0x3a/0xa20 [ 2833.385616] should_failslab+0x5/0x20 [ 2833.386426] kmem_cache_alloc+0x5b/0x310 [ 2833.387292] ? mark_held_locks+0x9e/0xe0 [ 2833.388156] create_object.isra.0+0x3a/0xa20 [ 2833.389106] kmemleak_alloc_percpu+0xa0/0x100 [ 2833.390053] pcpu_alloc+0x4e2/0x1240 [ 2833.390861] __kmem_cache_create+0x35a/0x520 [ 2833.391444] loop3: detected capacity change from 0 to 135266304 [ 2833.391793] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2833.394151] p9_client_create+0xc6a/0x1230 [ 2833.395058] ? p9_client_flush+0x430/0x430 [ 2833.395956] ? trace_hardirqs_on+0x5b/0x180 [ 2833.396880] ? lockdep_init_map_type+0x2c7/0x780 [ 2833.397407] tmpfs: Bad value for 'mpol' [ 2833.397879] ? __raw_spin_lock_init+0x36/0x110 [ 2833.397974] v9fs_session_init+0x1dd/0x1680 [ 2833.397995] ? lock_release+0x680/0x680 [ 2833.398023] ? kmem_cache_alloc_trace+0x151/0x320 [ 2833.398042] ? v9fs_show_options+0x690/0x690 [ 2833.398073] ? trace_hardirqs_on+0x5b/0x180 [ 2833.404346] ? kasan_unpoison_shadow+0x33/0x50 [ 2833.405308] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2833.406381] v9fs_mount+0x79/0x8f0 [ 2833.407129] ? v9fs_write_inode+0x60/0x60 [ 2833.408004] legacy_get_tree+0x105/0x220 [ 2833.408872] vfs_get_tree+0x8e/0x300 [ 2833.409654] path_mount+0x1429/0x2120 [ 2833.410467] ? strncpy_from_user+0x9e/0x470 [ 2833.411374] ? finish_automount+0xa90/0xa90 [ 2833.412284] ? getname_flags.part.0+0x1dd/0x4f0 [ 2833.413244] ? _copy_from_user+0xfb/0x1b0 [ 2833.414125] __x64_sys_mount+0x282/0x300 [ 2833.414964] ? copy_mnt_ns+0xa00/0xa00 [ 2833.415786] do_syscall_64+0x33/0x40 [ 2833.416561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2833.417617] RIP: 0033:0x7ff784b43b19 [ 2833.418392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2833.422218] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2833.423795] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2833.425278] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2833.426759] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2833.428263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2833.429751] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:11:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@permit_directio}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2833.645664] loop3: detected capacity change from 0 to 135266304 23:11:11 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:11:11 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2833.681633] tmpfs: Bad value for 'mpol' 23:11:11 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, 0x0, 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:11:12 executing program 2: timer_settime(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd\b\x00fdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080), 0x1001430, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cachetag=$,cache=mmap,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="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"/266]) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:11:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 57) 23:11:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2833.822153] 9pnet: Could not find request transport: fd [ 2833.880359] FAULT_INJECTION: forcing a failure. [ 2833.880359] name failslab, interval 1, probability 0, space 0, times 0 [ 2833.883018] CPU: 1 PID: 13048 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2833.884695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2833.886693] Call Trace: [ 2833.887328] dump_stack+0x107/0x167 [ 2833.888227] should_fail.cold+0x5/0xa [ 2833.889147] should_failslab+0x5/0x20 [ 2833.890064] __kmalloc_track_caller+0x79/0x370 [ 2833.891089] ? kstrdup_const+0x53/0x80 [ 2833.891939] kstrdup+0x36/0x70 [ 2833.892737] kstrdup_const+0x53/0x80 [ 2833.893652] kvasprintf_const+0x10c/0x1a0 [ 2833.894652] kobject_set_name_vargs+0x56/0x150 [ 2833.895774] kobject_init_and_add+0xc9/0x160 [ 2833.896876] ? kobject_create_and_add+0xb0/0xb0 [ 2833.898207] ? wait_for_completion_io+0x270/0x270 [ 2833.899434] ? kernfs_name_hash+0xe7/0x110 [ 2833.900489] ? kernfs_find_ns+0x256/0x380 [ 2833.901478] sysfs_slab_add+0x172/0x200 [ 2833.902424] __kmem_cache_create+0x3db/0x520 [ 2833.903475] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2833.904664] p9_client_create+0xc6a/0x1230 [ 2833.905687] ? p9_client_flush+0x430/0x430 [ 2833.906674] ? trace_hardirqs_on+0x5b/0x180 [ 2833.907694] ? lockdep_init_map_type+0x2c7/0x780 [ 2833.908812] ? __raw_spin_lock_init+0x36/0x110 [ 2833.909915] v9fs_session_init+0x1dd/0x1680 [ 2833.910930] ? lock_release+0x680/0x680 [ 2833.911883] ? kmem_cache_alloc_trace+0x151/0x320 [ 2833.913028] ? v9fs_show_options+0x690/0x690 [ 2833.914125] ? trace_hardirqs_on+0x5b/0x180 [ 2833.915233] ? kasan_unpoison_shadow+0x33/0x50 [ 2833.916348] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2833.917576] v9fs_mount+0x79/0x8f0 [ 2833.918437] ? v9fs_write_inode+0x60/0x60 [ 2833.919446] legacy_get_tree+0x105/0x220 [ 2833.920461] vfs_get_tree+0x8e/0x300 [ 2833.921363] path_mount+0x1429/0x2120 [ 2833.922297] ? strncpy_from_user+0x9e/0x470 [ 2833.923330] ? finish_automount+0xa90/0xa90 [ 2833.924399] ? getname_flags.part.0+0x1dd/0x4f0 [ 2833.925517] ? _copy_from_user+0xfb/0x1b0 [ 2833.926537] __x64_sys_mount+0x282/0x300 [ 2833.927507] ? copy_mnt_ns+0xa00/0xa00 [ 2833.928471] do_syscall_64+0x33/0x40 [ 2833.929365] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2833.930589] RIP: 0033:0x7ff784b43b19 [ 2833.931484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2833.935916] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2833.937737] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2833.939458] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2833.941201] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2833.942900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2833.944570] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2833.946293] kobject: can not set name properly! [ 2833.947329] kmem_cache_create(9p-fcall-cache-363) failed with error -12 [ 2833.948696] CPU: 1 PID: 13048 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2833.949427] loop3: detected capacity change from 0 to 135266304 [ 2833.950056] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2833.950063] Call Trace: [ 2833.950081] dump_stack+0x107/0x167 [ 2833.950102] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2833.950165] p9_client_create+0xc6a/0x1230 [ 2833.950192] ? p9_client_flush+0x430/0x430 [ 2833.956907] tmpfs: Bad value for 'mpol' [ 2833.957153] ? trace_hardirqs_on+0x5b/0x180 [ 2833.957179] ? lockdep_init_map_type+0x2c7/0x780 [ 2833.959835] ? __raw_spin_lock_init+0x36/0x110 [ 2833.960789] v9fs_session_init+0x1dd/0x1680 [ 2833.961674] ? lock_release+0x680/0x680 [ 2833.962458] ? kmem_cache_alloc_trace+0x151/0x320 [ 2833.963452] ? v9fs_show_options+0x690/0x690 [ 2833.964373] ? trace_hardirqs_on+0x5b/0x180 [ 2833.965256] ? kasan_unpoison_shadow+0x33/0x50 [ 2833.966438] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2833.967476] v9fs_mount+0x79/0x8f0 [ 2833.968214] ? v9fs_write_inode+0x60/0x60 [ 2833.969058] legacy_get_tree+0x105/0x220 [ 2833.969885] vfs_get_tree+0x8e/0x300 [ 2833.970642] path_mount+0x1429/0x2120 [ 2833.971422] ? strncpy_from_user+0x9e/0x470 [ 2833.972310] ? finish_automount+0xa90/0xa90 [ 2833.973188] ? getname_flags.part.0+0x1dd/0x4f0 [ 2833.974136] ? _copy_from_user+0xfb/0x1b0 [ 2833.974988] __x64_sys_mount+0x282/0x300 [ 2833.975926] ? copy_mnt_ns+0xa00/0xa00 [ 2833.976779] do_syscall_64+0x33/0x40 [ 2833.977530] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2833.978568] RIP: 0033:0x7ff784b43b19 [ 2833.979459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2833.983203] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2833.984752] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2833.986199] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2833.987645] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2833.989098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2833.990558] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:11:12 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000c80), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x30, r0, 0x200, 0x70bd29, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x9, 0xe05, 0x80000000, 0x80000001}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r1, 0x2, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x501, 0x6a}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x20000040) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000d80)=ANY=[@ANYBLOB="8ecc09d8197a178ef8140000de1e00210c000061c11959e82a98000000"], 0x14}}, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)={0x734, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x130, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth1_macvtap\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x37}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'xfrm0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x80000000, @dev={0xfe, 0x80, '\x00', 0x15}, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x10000, @private2, 0xaf3e}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc5b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7c, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5ff3, @mcast1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x800, @empty, 0x7fff80}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'vcan0\x00'}}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_SOCK={0x74, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x200}]}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xabc}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_NODE={0x2e0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xf1, 0x3, "b9650a95c6d9874a1dee11ef07ac2ae86fbd4eaec5615c79bb02522dfa16fcef3257ebea639b30c18513ddc46e0fa62c9888a9f58caa2da18937374a2d0f9719cd11887c6a27b877089af10ebfae3ff644d54af53e07f3cb9d0f1881360bd33dfd92457ff340c3fe7bf0fffdfed955fd0d637acbe1c78921679ca03f145d16797bd084dc611ebf3fb49a00d8081ddd54cb2206e0566c3b8f5d80e2fe2173e0a6367cb703dcdfe6ce5c01698b5f475027fd79a1e9935e55db920e65bd1c98818d630488ad482b959edd2df233300ed4ccf8fa53782615867b5e984b43591243f4056c744fbe46472f308a8375b8"}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "d93cfa7cf9781843ee905c597e6a3f338ef68e95c5"}}, @TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "a8291b29415dbfe7f88529f4da895a35e983a6650bf87df1c4680d"}}, @TIPC_NLA_NODE_ID={0xbd, 0x3, "492586de8dc9e324824e3043604ece09ab9360e892e03f2e0d12e5e90124e7e8d9460982088e54bd5e1e3cd14b2660c8ece47ac3b72db126c8fcc1cb6ce27ff319e68673a951ab0c43766f171dd6a60b09193772f9a3326bfccd5b3958de25d924661a36dfcc4584cbad500cc44e8dad2d8b64765783f9a0cc6c7802e96530530998c1b009a9cda3b8933395c9272421d589a23272e3ce7556fd79e6681f48da298733c8e09a28c6f79baf16f3c06d3d9a817784ca70e55a3a"}, @TIPC_NLA_NODE_ID={0xa2, 0x3, "bde958deb3e96fbb276e88e7b50bce4729c94eb5e5bff0673e18f208671ca30c0874c5db875a7998bd92e930d5b0a2a4af84c9a20856b527f4a468d82b3d31d04b19b513626a3fe7f6c716984a5991d91f772e48c0134b1e04848c3729645f71947c3a36e81be8f3c3f86057d2a2672f7cafb3ce54a0f6a043c50b49254008750e8e4e40f47eba7fde20dff8b0fec3ce6957b41647f8bc2e6f7b531c9caf"}]}, @TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0x68, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8ec}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x70, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x101}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_NODE={0x174, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "d27f75f2f8b5f45938726f7ee8ecdce51dfb4e7d178fde92a4"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x32, 0x3, "f89cd9ba3b5fe98f7ef46699ee5241e84dcd261f94381c727f4b386cb162856766f8365dc48d647698a3ab977f6f"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ID={0x3b, 0x3, "ab093a100c68cc7a80dbe5ee6cd28712c88c567e263fc2ff67ae1f213d5270c2f4d9f87d1389daea1e50f4b0605bea8dec3b5c794857dd"}, @TIPC_NLA_NODE_ID={0xa5, 0x3, "36d7a645ba5f5a16744543ac22d497dcb614fb554084673c148c4d63679db7b0be3be88f9f4d1f1a8e4c493b029c396bf8cf678f78e713e6b34e1c31e596563c67bd661c2a21352a33a54bdc2950db38378fec3e76a3928c3e169e7b6ddb4cb962b67d94223ae14be13c7b938e45e5230450c00badc957c4775a6646fe84273eafd56ef445d79fa6ef2fe0653df6d5fbdc5c132b6664e0b8c2adff5749e75097cd"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x734}, 0x1, 0x0, 0x0, 0x4}, 0x10) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) pread64(r5, 0x0, 0x0, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3a, &(0x7f0000000000)=0x2b22, 0x4) sendmsg$IPSET_CMD_LIST(r5, &(0x7f0000000e40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x24, 0x7, 0x6, 0xa00, 0x0, 0x0, {0x3, 0x0, 0x7}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x80000001}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x24040041) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x64, r6, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x48}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7fffffff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3ff}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x83f2}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xff}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1f}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000) sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r6, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4044001) 23:11:12 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0xb0, 0x9, 0x6, 0x3, 0x0, 0x0, {0x3, 0x0, 0xa}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_ADT={0x94, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x4f21}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x4}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x3e}}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x80}}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x890}, 0x40000) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="4446cac5bfb53a030458715cbe06428eaa7531373bdde46be90900a1927ebd3cf1213ea5564f6810daf6e7cc4db747976f9a022998fa5a0bc440ef1cb52c9f1aa655c2fe7afb1dfed99c17bee4ee6378f9171c"]) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) [ 2834.100221] 9pnet: Insufficient options for proto=fd 23:11:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2834.126330] 9pnet: Insufficient options for proto=fd 23:11:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 58) 23:11:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x5, 0x0, 0x0, 0x120000, 0x0) stat(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f00000002c0)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000080)='./file0/../file0\x00') mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x10, r1, 0x10000000) r5 = eventfd2(0x8a, 0x800) syz_io_uring_submit(0x0, r4, &(0x7f0000000140)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x6000, @fd=r5, 0x0, 0x100000000, 0xffffffff, 0xe, 0x0, {0x2}}, 0x6a772882) [ 2834.270607] loop3: detected capacity change from 0 to 135266304 [ 2834.275182] tmpfs: Bad value for 'mpol' 23:11:12 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)=ANY=[@ANYBLOB="0400fb050000000000000000000000fe01730000cea6f3aff7899a480e26d849e653bded85185cf0b6928bbe11ac8dc5c297fbe3a43e53ff475657a839863ccd7d8055bfaf840884a9391ef019673153489a3887fb414aec676a85eb154909e7ca64609a27d6c6246992ba190ce5390005ef62d34c2e9d6f287613aa9195ec2dc4d2c72ff05574b31f55655b09d0271a1f7babb1b4fa493134693f498a956996f44c78a26ad5e569984cf48d7b944d1205e559e0cd4c14e24424d62fd44369e3eb51a40e1c3413cffb105db16091f364e5de9336e27e4a679c2de78ee4035ac8a28ddb45d3db77747e9c69044fdc"], 0x14}}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0), 0x3, 0x90240) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x6c, 0x39, 0x6, 0x11, 0x0, 0x3, 0x1c400, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa24, 0x0, @perf_config_ext={0x48c, 0x6d6}, 0x289, 0x200000000000084d, 0x0, 0x15, 0x1, 0x2, 0x45, 0x0, 0x515, 0x0, 0x20000000000000}, 0x0, 0xe, r1, 0x8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x70801, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x46, 0x0, 0x7, 0x6, 0x0, 0x1, 0xc5220, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3a04, 0x1, @perf_bp={&(0x7f00000001c0), 0xd}, 0x4020, 0x2, 0x100, 0x4, 0x0, 0x6, 0x6, 0x0, 0xfffffff7, 0x0, 0x9}, r0, 0x5, r2, 0x9) [ 2834.344246] FAULT_INJECTION: forcing a failure. [ 2834.344246] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2834.346273] CPU: 1 PID: 13071 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2834.347649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2834.348933] Call Trace: [ 2834.349341] dump_stack+0x107/0x167 [ 2834.349898] should_fail.cold+0x5/0xa [ 2834.350490] __alloc_pages_nodemask+0x182/0x600 [ 2834.351326] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 2834.352380] alloc_pages_current+0x187/0x280 [ 2834.353116] allocate_slab+0x26f/0x380 [ 2834.353718] ___slab_alloc+0x470/0x700 [ 2834.354341] ? create_object.isra.0+0x3a/0xa20 [ 2834.355260] ? create_object.isra.0+0x3a/0xa20 [ 2834.356129] ? kmem_cache_alloc+0x301/0x310 [ 2834.356802] kmem_cache_alloc+0x301/0x310 [ 2834.357441] create_object.isra.0+0x3a/0xa20 [ 2834.358117] kmemleak_alloc_percpu+0xa0/0x100 [ 2834.358801] pcpu_alloc+0x4e2/0x1240 [ 2834.359392] __kmem_cache_create+0x35a/0x520 [ 2834.360184] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2834.360992] p9_client_create+0xc6a/0x1230 [ 2834.361655] ? p9_client_flush+0x430/0x430 [ 2834.362337] ? trace_hardirqs_on+0x5b/0x180 [ 2834.363152] ? lockdep_init_map_type+0x2c7/0x780 [ 2834.364056] ? __raw_spin_lock_init+0x36/0x110 [ 2834.364785] v9fs_session_init+0x1dd/0x1680 [ 2834.365439] ? lock_release+0x680/0x680 [ 2834.366053] ? kmem_cache_alloc_trace+0x151/0x320 [ 2834.366780] ? v9fs_show_options+0x690/0x690 [ 2834.367455] ? trace_hardirqs_on+0x5b/0x180 [ 2834.368110] ? kasan_unpoison_shadow+0x33/0x50 [ 2834.368809] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2834.369578] v9fs_mount+0x79/0x8f0 [ 2834.370115] ? v9fs_write_inode+0x60/0x60 [ 2834.370846] legacy_get_tree+0x105/0x220 [ 2834.371531] vfs_get_tree+0x8e/0x300 [ 2834.372147] path_mount+0x1429/0x2120 [ 2834.372766] ? strncpy_from_user+0x9e/0x470 [ 2834.373543] ? finish_automount+0xa90/0xa90 [ 2834.374382] ? getname_flags.part.0+0x1dd/0x4f0 [ 2834.375178] ? _copy_from_user+0xfb/0x1b0 [ 2834.375808] __x64_sys_mount+0x282/0x300 [ 2834.376526] ? copy_mnt_ns+0xa00/0xa00 [ 2834.377172] do_syscall_64+0x33/0x40 [ 2834.377832] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2834.378598] RIP: 0033:0x7ff784b43b19 [ 2834.379156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2834.381902] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2834.383046] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2834.384282] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2834.385632] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2834.386689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2834.387741] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:11:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2834.521269] loop3: detected capacity change from 0 to 135266304 [ 2834.525713] tmpfs: Bad value for 'mpol' 23:11:12 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001f002121000000000000000004000200aa1d94d748412ed1b84e590f7df15ddc6b32a0bff755c46da3711549185c711b4b3e3b7f96a222d6c21019fbc1ec1484f00578285c7a8436c6e6aa7991734ea90125c8aa220947e11ee6ce4be21d4235631aaf1f5f1ca29c7590af53d3a949a68057f029595f721ca6c586a9faa1f48955c2d759889342b7806af5626eeceb3fbf5285e5ed8f280f74c319196ff53cf57bc9db61026f014a78ec5e"], 0x14}}, 0x0) 23:11:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) [ 2834.724828] loop3: detected capacity change from 0 to 135266304 [ 2834.733396] tmpfs: Bad value for 'mpol' 23:11:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0xb20033, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB='\x00\x00']) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:11:33 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 23:11:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="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"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:11:33 executing program 1: stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$nfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xfff, 0x2, &(0x7f0000000300)=[{&(0x7f00000004c0)="8004c786c89f0cdc60c151747eedc7577a81f32bd55ec89f4d6dc21f888f3023d4ca48d78538344ccd1a32ff950d685591652e513960cbab9d1ecbe65a52ee8709930596a4bae40d7fba0681f203d9af5453a62e6579d6721f04603eb470087701f6579cf891aae2a900abc6affccc33e82337913e6f024bbc812afd2299f498bf13e13a0e7f9add1b65e2bdba5962b7076778952f9479380560fc9ad1530c60067177e93723b9b1f91eb174af1e6d0c7b47c98e76b9bac78f9fd40064b1616188d453a5fce295587781b4f7316b2765126747f1b4b8a31a43fd1cc3b196daa221549c747f0dcc67b886f426f7e5a98db7d2eee327f22bbc086dbeaac1f1039d00b0ee4a78b1069b3526b57d349cef4851996138a214dd475bf763734a40fee0533c6e07b0c66341c7a9e747554e75da9d663e9781875efcf7f0237ae0b3f436a0738370879d7a7acbfd3b6d83cfe39ddadc3c4f3d2511d436d919799e98c95f594ef59bb7bb3cadcca898a3f635dafdda70e342dcb8e32fc79690d4d523bfe54c57197386b938ddadbef12b479a86538b86bc8ac0699ec2f03972060233cb3713ce30c48413cf7a3e7c71dec7048127402eeb6b2a147ddd8f0a8c8134cb7dd856f9ebbda6504973d79ef6737e86f43e041f6a3c604f4fe7c90bc60d513842a3440f4b7a5cd925d5cdc58cf3a51f34a72e813626b1769e65aae8af15a1c3e25a3b9f221a9846953ad68e31560e5bb87436632e2803f6c58d73987fa46f301719b2063666e3dc5035e90de14f31588a093b99eac286b9a27e03f8ed2c30ecb0835bdd1c1c79e6a190a9da1331b124a5273389c4c829d0ab26bfd78a1ce2e77463a2a16305ee49017196874e976766f043e14c79cbf9805a891a8fc721322758afc82348687b1004b14afa9525e23e79504b7aa952d35265d6fc78a44b7e36228fe6911d6144a4771e7df7bb640adce21f8ab9fd963d5a86ee7f9eba264ecf7b821d98cae4fdd4f626dd3bd13c7e00ff65fc8d8a292ca89b06f5029b180c721fb352e55978bbfb2c6b4cabc88067b4f0490bbca47a0ed5112b36c95f5e46b17f3b18a56b6e4a6b2798835c5d5e330ed05da1052e98d3520e24daab8f95076fbc41498a092b0a984e3c0f2890b11096952a80f9f8eb1f87f7933206d192e50bfbab5ed70e69cf53205b04f81fe412da7967554ac1440ea4a2aafd6884d423b4c2a6d822d33d79306ce04d7554beb8d22fc6fd03da0619cc915d68fafb98d8654643804f542a915dc1213302d61d70a701f51506bbcaf0d90cfba26d7476d9d67419c4ceeb30ef4ecc31d337e6281b61d4fc6b23e05a865679adf8967059fdd33c3b6d8055b551790852961842b15b29cc55f301daa79ce104bebc6d0fa7603de64cbd160111e3658649c4e62ee3b393c6aa3a0e701ae25abe1ca4beb2cbb332eb03183b81298edd4f4fa7a8a82662c7d9c06904119583c748b7a20fdd912ab1e726568cc2d4e81cc6e5c3d01e0d1cfcaec160b3c66a7a5a801847d635e2ea5239d939cb7454c4455dc458bff976b11ab3292d95fdc0e06eb8cb43b30dc0a8f434b5067764598aa4df78382fbf922fdc29f809064ad6333ebee079cc19c3eecfebe1cd346abee369027b6b4a492cf1626f81dd6a12dbe334dbc51a202f0709202b5dd3312234b19169b6d6b59f259a7ffea8a2899715019a748c085e54c90f90c5769dcf28cea488c70f35462ed7bfed171d88e74b4e35ab0323e25e3974d8b4d895793b6956b7a1934eb85193f1e5d98e32c66668d563483b83c16932ac19d522ad3b576fb5be59793b136023bca7965276bd16d1be8314cccfee62cef6f6de4af75834e90e697aed26f2734b5b922916e4b4e1b5ee7d8422bce85ee82b803bb000a6ba2b8165a6c5ccc310569c96da9c4596de46832ad570938db71d3f283155cbce9803472b08063b27a01241cf7851d5ba340f37ac98c8b923c8c4c702eb1d72821331556f827bce080a7e295a84f96bdbc61f8945dafd35813cdc2e38ec0dcd59ebd4e22e048fe0bd390541e1828780a8957631d9543c671f5b89c2da5d25d7ca76c611456d7bc1015d1d0c9b3f56c27a78d5429b36e6300931df063c0631976ddd11dcacf7cd3625b87baa1cdaa9ed9c3405592fc39d35bc2cc86dc85af25301b2975823307a0fbba7924d0eedd18ed11bb2f60b380771d184b9208fe3d2c0f612cb23388b6763e730132920c3333df833db86ef6e38a994021aac997975d4fab6f2985404cde7a317429cbe46e5ea0f17d40ddc23c36a8b75dc0acf82deb4801707d4617a25173b35de800701f2bed0df2d870e74bfa84b05323cf2b69fa8627c09f754737e8c8a42d5e1c3b1ac7e25497dacafef9ac3a43dec687c945d3337501be4cea39e55f47bb28d49eb153b6256abb450e6cfd393cbfaae3516388ef80cee01d6b8cd7596deeeb89e03552fde154df950034ef48e1b200cdc862024f6e436b8ac9db1517a525ed169ac880e017fb8f51188bde85754c084ca47387d1fbf68b7eb987974ea5b5262ecc70294dc99c799f398bc826e0f70a1ddd3636f5ef9ea577ed3473db8ff5b790ea6015ba7416101ce3bae49c121a5ecddf858ad796289922882bdf1fb27f3ff8528ab3c3a638b56e18f878e51d5c35b71e1f421427fcd9366555ed7caaf3283a121f89bca52d68ae82e491479092cd55e51f84af3b9ee9701fb9bb21c9761c465099b5389186b867c772f67ea736d551c73b2533851cbe25375bc5ed4fbda834218d9f3117dd445ba3f362c0d12bbdabe9eb7e4d3669ed7bc5722f773a60cc92687ebf3c308449b999f71f13d5ba5f0a4bc75d8420f6abc7cccd156fe0c447b90d6f2fcea166e7c92a9d2338d578196be7779e1f9d662e6faa1687a225c96a20752c8e01296f0410b280098cf731d2cbf129ecd0ba2aa0d076e5abddf8c1b0be03396dee7333c858d6504506e9706987f3f3e6e38b91e0ef89c72d4023dcbc2c787e6f4e17fbbb956c5b8791dc395bc59777baceed1bbaf865c9f4236e322d2484370c53cf475d9cb6ec6305b84d0c16774e1eeae96750e16509131448d334d98928ef07ecf3fde053aa52fb43643fa3ddadd960a7cb1bf8a495fd27e2d0f2b9b025ec16b0d5fa70616df48d3b006a90520cc5a0a185235bfdf567262ec93c2dcb15d87c400eead4b7c006efca6e2fe80c62f4e70cc00980e182bfb33123c69a2503a9b21bfbc19ac168f7694eb74c00fee092a4d05fa3d1f31fec7ae3fe4ca82d3b2dc38a48ab2cdca74fc451c0accb83fe1c1ed0197c6f9d89e9677be2cbb2f15417ce3589cfa105563e8d90099f89201588cc31dece8233eb67fa3cc697044074d40eef1af2f96b685c929c3c1960aff0506b34936a752d03aa2d4702681835c0c5846b66aaf4842de0e51a685ffa6acb2cebf274bf4ac13ab7f30b7fdde6868cf89301097444ac5995352ea7a1146f03f085208626761c22ba057a836c823e91617f995d2934f12d8b1a84288810d8f23a04138a1c5fc64eeaaf70633a8cbfdbc97ade1a33a6308f4d07b8fc1f113d4fb5041b298efa9e62f1c065d6a48071c1ab967db537c103e80166ea06859dd54a473edeca20f8f697463726e6eb7d8e8e21aa7214ab47c555d0cda691aa36939b88543d77b4709f0c1e8a252e63153a432a4ca319d31666bc9dbf21daed077a5ee848c4d1518c6e2ab62f51d7b29ce85fe42a331997e92f57143d6256327e7bee9471650d8a9d0fe30a726bf65c8e9d2e0179ca48b41d052690a16f19ce594222a17fbf0c3711da200be9a6db265333c8b9a02fbacd859b164191636507c1ea7d708434e1e90e1bd999c901eac41992ce520870ec1b82d193b4864ec6590409f9605e9b54558efef550e95ca14d1c47d556094b6116d34c395492ec8c79b1cacec6b2d22efb98af53a385eafdc5983a2c57a2081919e294f16e4534a58a823e4b22435189bdec67011fe437ecc035b3b160f804c94a8266eb24813781773d8a542ed32f9560a94d3c7c0f86d2bf654c6c17c863184c7c4095ebe8e845067f782f2a270cacaab499167fcee2e865121b24110434867c12f56593f4d6ade8b18d7af4b489d6fb9af91bd2083bbefe5fb999a21eba003a57344fa76c4308b1d08ca94ce19336b85196ee9e0c843adccfbd69e0d7097ebd3c7818bd9bf336545668bc94eb7eee4d0170f3007e67fa795846ce7c5faf27eb5466686c35f52b5b6419e33986abdb6138868bb0fb98a6ee8ed4df7dcbb54658d9bcefda6b51acaba7d774c1487e0abbe80df42c5012ba73003ec361d7bc4673a7e24498c23d8c0224ac3ab188382e8f26154ef6d8c8a137b9139fcacb908acebf09e21b940cbffd9937fdc57472112910d1419aa4e4720e271953defced534ba1288a4434fb95e3fcb5017022f1e212eaef326641bf9cd5883113b5a7ec447daeac9a7d69c568763a5c5252ffce658f62ba4bacbadbb22b773fbf1576c9352eb0e0d9d97899e5f581fb31edef867e80d95352d9dc8ab62dfc23b6f5effb664d1f1e34adbfd76132571e95a2a5b85b0b2b672e380f73b5d34ca65ce6c80516d76c68953072c4aa68e536eb3fd16d29b4fb4760eac82c41b9f8922b6d03df6ff8766f172d2015570020b1864f2cc7ec683309c8d98146880fef709114e0f34b9056fe4f959fc51a8c5d7dbf5796c9a5549f718c0d9abd01a5a4f2fe33227453a160b9d9d535af11a531a273fe662ff619bda45acb684559cc356e8df700d598e4654a25e477216e23c8f5e006b12be8fbfb04cc102f22c13e2e291cb3783c0bd4a7dc4d779af74a1f03c353571721aa20d4afcc8ea54685ae39fbbd4a57b918e7f65ddecce43c52ffa5db6e82451c39de7bfd6cd9604b595b31fe030a50f7d2fad17f4f3bb2219125a61b5dedf29c962ae6258df380a83c835d7b3fa9e73c347df080fb230ebd5c6760b79b0170aef0a1d0883a9d7c21c30a127ee8f9f9e1a770f94afedd2dd0ee2236a1ef0cf03a87b19f54fd23a15ae216bd8a926d589b7528d04bb754ccc7aade789c057c93df404d014a0ebe0d9a3e62d31bfa0ef6cea509bb07edb202c61875cf883c74ef0dd59c37ec7ad56dec8da08a01203fa3ac78dfd6ad8ec61d14e101a3aa3fc6651b9170f25976860731947e629c67b7c307af90ee4f9d9e5dbb34f5da58da94fb96cb31e9f6d326404c2f0322a39e2ef7a1f0593ab6cb509b55342ee627b121cc78e229b937f873b1564a8a08f9aa6b7fa857eaf70631a1d4f63f5600436e260c430acdda03d590fb4ef71956b9d0f5ca370a34c78092e7c8f92e76dfbfce2f684ccba7284c3da60ec0d8d3a71fdd11daa5cdb192aa51a327521754f5546cc880686270d44c14cb67e40eda45ed97cef8568796cfc3f2bcfb129d3935532d4815a3a6909ffe73c6d872aae784c582dd71aaa6bca5a68a8182a80313a9be4bcb7c108390412be2b5ee44700107eaf530444ef64bfb5f099aeac4ecae6200504d079014abd99f77101c9514c07234cf20c9a0abe87f31ff164b11cde1fc11e40e71785c4f026a5d285b5f60d9e8c89c0d094f483bebc3dc18c561e160b5a691f44efdcbae0d857233a5e521799d741ec207556d4773ef2c7f952f8a138ff8f05b97589452efc31650d496345d8f1d06d6620817b2aa278b7088356dfaecba10f8277467dee4841f483e5e9758628cfa25e88124b1f5071911e251b07eaf15a2122e147449af0f83c1fe80bd5942f85ecdb0636343f02377c6ecf909a4f593db9a5", 0x1000, 0x3}, {&(0x7f0000000280)="3553795eab474fd14845a11a7218b21827424ea0b9f2fc6f37c625c7734e03406a345a2259282b835ad13917cdb3ff91096dc76a6b2f6f7e57adc0085a0f872bae5dcebaa38f47da8e87cc8e4e790e433e7b7738d6c87b152f019fdbd328dfffcb08984910de620dacd26720746f02c5fee73c52062254d7", 0x78, 0x2}], 0x0, &(0x7f0000000340)={[{'\\'}, {'-@-+{\'%^@/*#'}, {'A[#'}, {'$'}, {'/dev/null\x00'}, {'[$)Z^\xd8/#&'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/null\x00'}}, {@hash}, {@context={'context', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot', 0x3d, '\n^@(-'}}, {@subj_user={'subj_user', 0x3d, '+\\@4+['}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, r0}}, {@measure}, {@dont_hash}]}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x9, 0xd2, 0xf9, 0xffff}, {0x5, 0x4, 0x4, 0xc13}, {0x100, 0xe8, 0x6, 0x3}, {0x274, 0x7, 0x5, 0x8}, {0x8, 0xde, 0x2, 0x1}]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000140)={0x4664, 0xcef, 0x4, 0x0, 0x0, [{{}, 0xe8}, {{r2}, 0x4689}, {{}, 0x7}, {{}, 0xffff}]}) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) 23:11:33 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x100000000, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, 0x0, 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) r3 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) close(r3) 23:11:33 executing program 5: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) 23:11:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 59) 23:11:33 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) [ 2855.125509] loop1: detected capacity change from 0 to 4096 [ 2855.128641] FAULT_INJECTION: forcing a failure. [ 2855.128641] name failslab, interval 1, probability 0, space 0, times 0 [ 2855.131310] CPU: 0 PID: 13105 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2855.132159] nfs: Unknown parameter '\' [ 2855.132775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2855.132788] Call Trace: [ 2855.135882] dump_stack+0x107/0x167 [ 2855.136653] should_fail.cold+0x5/0xa [ 2855.137475] should_failslab+0x5/0x20 [ 2855.138283] __kmalloc_track_caller+0x79/0x370 [ 2855.139247] ? kstrdup_const+0x53/0x80 [ 2855.140078] kstrdup+0x36/0x70 [ 2855.140760] kstrdup_const+0x53/0x80 [ 2855.141631] __kernfs_new_node+0x9d/0x860 [ 2855.142513] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2855.143530] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2855.144638] ? find_held_lock+0x2c/0x110 [ 2855.145502] kernfs_new_node+0x18d/0x250 [ 2855.146364] kernfs_create_dir_ns+0x49/0x160 [ 2855.147294] sysfs_create_dir_ns+0x127/0x290 [ 2855.148222] ? sysfs_create_mount_point+0xb0/0xb0 [ 2855.149525] ? rwlock_bug.part.0+0x90/0x90 [ 2855.150414] ? do_raw_spin_unlock+0x4f/0x220 [ 2855.151338] kobject_add_internal+0x25e/0xa30 [ 2855.152285] kobject_init_and_add+0x101/0x160 [ 2855.153233] ? kobject_create_and_add+0xb0/0xb0 [ 2855.154211] ? wait_for_completion_io+0x270/0x270 [ 2855.155219] ? kernfs_name_hash+0xe7/0x110 [ 2855.156109] ? kernfs_find_ns+0x256/0x380 [ 2855.156998] sysfs_slab_add+0x172/0x200 [ 2855.157837] __kmem_cache_create+0x3db/0x520 [ 2855.158763] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2855.159815] p9_client_create+0xc6a/0x1230 [ 2855.160710] ? p9_client_flush+0x430/0x430 [ 2855.161603] ? trace_hardirqs_on+0x5b/0x180 [ 2855.162518] ? lockdep_init_map_type+0x2c7/0x780 [ 2855.163512] ? __raw_spin_lock_init+0x36/0x110 [ 2855.164475] v9fs_session_init+0x1dd/0x1680 [ 2855.165409] ? lock_release+0x680/0x680 [ 2855.166250] ? kmem_cache_alloc_trace+0x151/0x320 [ 2855.167259] ? v9fs_show_options+0x690/0x690 [ 2855.168189] ? trace_hardirqs_on+0x5b/0x180 [ 2855.169101] ? kasan_unpoison_shadow+0x33/0x50 [ 2855.170058] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2855.171117] v9fs_mount+0x79/0x8f0 [ 2855.171896] ? v9fs_write_inode+0x60/0x60 [ 2855.172768] legacy_get_tree+0x105/0x220 [ 2855.173636] vfs_get_tree+0x8e/0x300 [ 2855.174441] path_mount+0x1429/0x2120 [ 2855.175245] ? strncpy_from_user+0x9e/0x470 [ 2855.176147] ? finish_automount+0xa90/0xa90 [ 2855.177058] ? getname_flags.part.0+0x1dd/0x4f0 [ 2855.178032] ? _copy_from_user+0xfb/0x1b0 [ 2855.178912] __x64_sys_mount+0x282/0x300 [ 2855.179760] ? copy_mnt_ns+0xa00/0xa00 [ 2855.180583] do_syscall_64+0x33/0x40 [ 2855.181369] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2855.182447] RIP: 0033:0x7ff784b43b19 [ 2855.183226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2855.187087] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2855.188682] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2855.190184] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2855.191677] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2855.193177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2855.194678] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2855.198164] kobject_add_internal failed for 9p-fcall-cache-369 (error: -12 parent: slab) [ 2855.200140] kmem_cache_create(9p-fcall-cache-369) failed with error -12 [ 2855.201591] CPU: 0 PID: 13105 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2855.203043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2855.204777] Call Trace: [ 2855.205339] dump_stack+0x107/0x167 [ 2855.206106] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2855.207208] p9_client_create+0xc6a/0x1230 [ 2855.208105] ? p9_client_flush+0x430/0x430 [ 2855.209003] ? trace_hardirqs_on+0x5b/0x180 [ 2855.209907] ? lockdep_init_map_type+0x2c7/0x780 [ 2855.210900] ? __raw_spin_lock_init+0x36/0x110 [ 2855.211858] v9fs_session_init+0x1dd/0x1680 [ 2855.212764] ? lock_release+0x680/0x680 [ 2855.213615] ? kmem_cache_alloc_trace+0x151/0x320 [ 2855.214626] ? v9fs_show_options+0x690/0x690 [ 2855.215554] ? trace_hardirqs_on+0x5b/0x180 [ 2855.216456] ? kasan_unpoison_shadow+0x33/0x50 [ 2855.217421] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2855.218483] v9fs_mount+0x79/0x8f0 [ 2855.219225] ? v9fs_write_inode+0x60/0x60 [ 2855.220095] legacy_get_tree+0x105/0x220 [ 2855.220956] vfs_get_tree+0x8e/0x300 [ 2855.221738] path_mount+0x1429/0x2120 [ 2855.222539] ? strncpy_from_user+0x9e/0x470 [ 2855.223439] ? finish_automount+0xa90/0xa90 [ 2855.224376] ? getname_flags.part.0+0x1dd/0x4f0 [ 2855.225361] ? _copy_from_user+0xfb/0x1b0 [ 2855.226235] __x64_sys_mount+0x282/0x300 [ 2855.227082] ? copy_mnt_ns+0xa00/0xa00 [ 2855.227902] do_syscall_64+0x33/0x40 [ 2855.228681] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2855.229759] RIP: 0033:0x7ff784b43b19 [ 2855.230536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2855.234392] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2855.235982] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2855.237480] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2855.238969] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2855.240458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2855.241958] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 23:11:33 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) [ 2855.374369] loop3: detected capacity change from 0 to 135266304 [ 2855.378830] tmpfs: Bad value for 'mpol' 23:11:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 60) [ 2855.433939] loop1: detected capacity change from 0 to 4096 [ 2855.443205] nfs: Unknown parameter '\' 23:11:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000300)='./file1\x00', 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) openat(r0, &(0x7f0000000200)='./file1\x00', 0x401, 0x40) rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='mnt/encrypted_dir\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@local, r3}, 0x14) stat(&(0x7f0000000480)='./file2\x00', &(0x7f00000006c0)) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000340)='./file1\x00', 0x1, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000500)="150ac111dbf36cc745121458c3fe9aaa7ff840599d864e16dfe04d351cd1812938189f29ce644a652bfc16f3d8e31bf71e65437fd88388ec13aa37a1ed2da8cf6f172b11bf51bee09eb8cff3160de90f4df21aa9ba52136ebdaa5fd43fbb2c33022ce7bf643351662737903365ec0ff57bb28a41f3bb1948795831071f515d89621bfc2c6619059f74a0f9d7aa7d6198167855b9e1f62c47a51ea963822d89924831d9fe9ef538a158c58d9f1f58400fe079fe92712bab0348c99998360f2acda762f5900828b04732430d6a1b9b8f8bf14c0830a1c4920fdce52042068dccbabd3fc770e40246ddcc69", 0xea, 0x8ddf}, {&(0x7f0000000400)="8a6ef9eb650e1ed2ad3b1777fa05f4d32675ec41c9e5e471a6b5d441384158ebdade4e40b5d4837381d298e482e9859c32c60136079af137454f0dd9fb7861144a5be37ae7912136c756fec10516a5bfe0536533536b886900d7131ea1c3a66e580050786d0b4fa5bbbf32842ca02ba6edac27bded", 0x75, 0x100000}, {&(0x7f0000000600)="920ada0842a19e1b824c3175e89b310c029345dad7de90e833d88b43e37d04373f9b7851758fd137cd95f3efe9c53c9d2b044cdfc2f66c947ad24f856c88bac982db0fce09206e250e09205bf0b95404", 0x50, 0x80000001}], 0x0, &(0x7f0000000940)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'bind', '', @void}}}], [{@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '#/,'}}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000600"/28]) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syzkaller0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000740)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="00010700000001000000056b4a2000a800670000f82f90787f000001ac1e010107171500000000e00000027f000001ffffffff7f000001440c3730000000030000d8e18307b30a010101072bd87f000001ffffffff7f000001e00000027f00000164010101ac141411ac1e00017f000001ac141422830b22e0000001e000000289232e00000000e0000002ac1e00017f000001ac1414bbac1414aae0000002ffffffff44118e68908755e279d577be032a57beeda8c0ffd70acc5196dd0ebd8e010d36b9947987a6f01d9327f0c51d8afd9c64a9cd84d52a5a2587c50173000000000000000977cd859d5b427d1511fa5363f7eee4cf8301eaa5aabe0eea823c85e4baec89e04a3191a825e82911e7471b6930e5c09f8f87b63f07b5ffe67a50cc0dacee699b4776bb2453545bc81bd3fadee79a7bee0cb9ed0d65fa53bc4ae31cef62127cfaad3ece7b75d9"]}) openat(0xffffffffffffffff, &(0x7f0000000680)='./file1\x00', 0x200100, 0x50) 23:11:33 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) 23:11:33 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_ima(r0, &(0x7f0000000000), &(0x7f0000000080)=@v2={0x3, 0x5, 0xe, 0x7b0, 0x21, "5b616fbc4175614487b6b0338394749942b1ee11c3e0ca5d48ef1068cbc8ee3d3c"}, 0x2a, 0x3) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r6, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}}) ftruncate(r6, 0xff) ioctl$MON_IOCX_MFETCH(r4, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_MFETCH(r8, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x4}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}}) io_submit(0x0, 0x5, &(0x7f00000006c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0xf, 0x3, r3, &(0x7f0000000140)="886e993d007e8e7fd7a73cecff477d5031f705905bc82d5accc768a43ca6cff6bd8b", 0x22, 0x200, 0x0, 0x1, r5}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x6, r1, &(0x7f00000003c0)="5f16e1a3a0fe122f2d51a1c4e3ed70f8f10de1a01c027d5f3e818c1dfde3087744ce61f148e20fa5d129ba7a71f18972a6c3c24cfe0cce1e6c094ee8b4e0fe74f6846e6265671cfbe7aeedf14cbf85102f3769a24f6207fa6a6bc4ab5fa7662da756119ba1cf993ae2c4b4e3896578a757924c118f310835c832573f69415839e1a0c72f51127102db5b95db810502d3b21f159e31a4ee45dd024fd5a0a4a279a7a526a49a94623089", 0xa9, 0x1ff, 0x0, 0x3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0xb71, r2, &(0x7f00000002c0), 0x0, 0x7d, 0x0, 0x3, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000480)="8831e9e17c9facdff4d247fb55c905ed6046df6234db7625e68b98349b22cf137b2e0b784c1c472bc73e9b9689830160b54b17a8474311182b6a2a9167af424fe2e5fa51434e94d5e57b81a4d2421708f1a02712586767ed3bb6a7767d09e7e7a8b6811a4c72ffaf8ee9e1c32626074db069a9480bb9e2a1d38b3924f4a019364a0032e2da5389fffcacfbe6f973ee2d29ab9c83f78f0488063335e9686b304a581779535dbaf10f2b4549438db35edd38103e60ae368e64c15699708a6203fae170d29dd35268451388d6ea8ccb2f6f208203c5f389316b02d409f82b37", 0xde, 0x81, 0x0, 0x2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x6, 0x7, r8, &(0x7f00000005c0)="f18284ca32303851b3614977c88b2eb7ebd9a681e12a0e9e9ee3505f27e0b4b01013f7c055f030d4083e42539965b8fd283c96d43653b506e6d4bec1cbdd950663eb1d960e7554ce619e90b07d9e3caffc6ad4aa79d266dbd3c32ac19ed9ba9c51526c0d046bc6b70c502dadfa358961f47b235480933e283579e37ffee12ebffbac43f62d5fe3c35d3549f118b87140d56603b5688f0a177d54cdfc91b111c6be6e0e4493875960d15300632dceb7a2d5aaeee4be35e6001220a511f2bf", 0xbe, 0x0, 0x0, 0x1, r2}]) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="1f", 0x1}], 0x1) 23:11:33 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x108, r2, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xf4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xabbf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc05}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x40000}, 0x20000040) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) [ 2855.595770] FAULT_INJECTION: forcing a failure. [ 2855.595770] name failslab, interval 1, probability 0, space 0, times 0 [ 2855.598332] CPU: 0 PID: 13126 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2855.599904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2855.601655] Call Trace: [ 2855.602218] dump_stack+0x107/0x167 [ 2855.602988] should_fail.cold+0x5/0xa [ 2855.603792] should_failslab+0x5/0x20 [ 2855.604590] __kmalloc_track_caller+0x79/0x370 [ 2855.605556] ? kstrdup_const+0x53/0x80 [ 2855.606382] kstrdup+0x36/0x70 [ 2855.607057] kstrdup_const+0x53/0x80 [ 2855.607837] __kernfs_new_node+0x9d/0x860 [ 2855.608713] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2855.609731] ? lock_acquire+0x197/0x470 [ 2855.610567] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2855.611665] ? lock_release+0x680/0x680 [ 2855.612496] ? find_held_lock+0x2c/0x110 [ 2855.613363] kernfs_new_node+0x18d/0x250 [ 2855.614222] kernfs_create_dir_ns+0x49/0x160 [ 2855.615144] sysfs_create_dir_ns+0x127/0x290 [ 2855.616066] ? sysfs_create_mount_point+0xb0/0xb0 [ 2855.617087] ? rwlock_bug.part.0+0x90/0x90 [ 2855.617977] ? do_raw_spin_unlock+0x4f/0x220 [ 2855.618904] kobject_add_internal+0x25e/0xa30 [ 2855.619855] kobject_init_and_add+0x101/0x160 [ 2855.620801] ? kobject_create_and_add+0xb0/0xb0 [ 2855.621793] ? wait_for_completion_io+0x270/0x270 [ 2855.622814] ? kernfs_name_hash+0xe7/0x110 [ 2855.623711] ? kernfs_find_ns+0x256/0x380 [ 2855.624649] sysfs_slab_add+0x172/0x200 [ 2855.625503] __kmem_cache_create+0x3db/0x520 [ 2855.626434] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2855.627492] p9_client_create+0xc6a/0x1230 [ 2855.628391] ? p9_client_flush+0x430/0x430 [ 2855.629294] ? trace_hardirqs_on+0x5b/0x180 [ 2855.630209] ? lockdep_init_map_type+0x2c7/0x780 [ 2855.631204] ? __raw_spin_lock_init+0x36/0x110 [ 2855.632173] v9fs_session_init+0x1dd/0x1680 [ 2855.633093] ? lock_release+0x680/0x680 [ 2855.633936] ? kmem_cache_alloc_trace+0x151/0x320 [ 2855.634941] ? v9fs_show_options+0x690/0x690 [ 2855.635876] ? trace_hardirqs_on+0x5b/0x180 [ 2855.636782] ? kasan_unpoison_shadow+0x33/0x50 [ 2855.637748] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2855.638817] v9fs_mount+0x79/0x8f0 [ 2855.639560] ? v9fs_write_inode+0x60/0x60 [ 2855.640435] legacy_get_tree+0x105/0x220 [ 2855.641302] vfs_get_tree+0x8e/0x300 [ 2855.642081] path_mount+0x1429/0x2120 [ 2855.642893] ? strncpy_from_user+0x9e/0x470 [ 2855.643801] ? finish_automount+0xa90/0xa90 [ 2855.644716] ? getname_flags.part.0+0x1dd/0x4f0 [ 2855.645699] ? _copy_from_user+0xfb/0x1b0 [ 2855.646577] __x64_sys_mount+0x282/0x300 [ 2855.647427] ? copy_mnt_ns+0xa00/0xa00 [ 2855.648253] do_syscall_64+0x33/0x40 [ 2855.649037] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2855.650113] RIP: 0033:0x7ff784b43b19 [ 2855.650890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2855.654748] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2855.656348] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2855.657856] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2855.659346] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2855.660833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2855.662327] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2855.664060] kobject_add_internal failed for 9p-fcall-cache-371 (error: -12 parent: slab) [ 2855.666116] kmem_cache_create(9p-fcall-cache-371) failed with error -12 [ 2855.667734] CPU: 0 PID: 13126 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2855.669201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2855.670934] Call Trace: [ 2855.671481] dump_stack+0x107/0x167 [ 2855.672245] kmem_cache_create_usercopy.cold+0x17/0x65 [ 2855.673360] p9_client_create+0xc6a/0x1230 [ 2855.674249] ? p9_client_flush+0x430/0x430 [ 2855.675164] ? trace_hardirqs_on+0x5b/0x180 [ 2855.676067] ? lockdep_init_map_type+0x2c7/0x780 [ 2855.677087] ? __raw_spin_lock_init+0x36/0x110 [ 2855.678040] v9fs_session_init+0x1dd/0x1680 [ 2855.678944] ? lock_release+0x680/0x680 [ 2855.679778] ? kmem_cache_alloc_trace+0x151/0x320 [ 2855.680788] ? v9fs_show_options+0x690/0x690 [ 2855.681723] ? trace_hardirqs_on+0x5b/0x180 [ 2855.682620] ? kasan_unpoison_shadow+0x33/0x50 [ 2855.683568] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2855.684631] v9fs_mount+0x79/0x8f0 [ 2855.685377] ? v9fs_write_inode+0x60/0x60 [ 2855.686240] legacy_get_tree+0x105/0x220 [ 2855.687093] vfs_get_tree+0x8e/0x300 [ 2855.687868] path_mount+0x1429/0x2120 [ 2855.688665] ? strncpy_from_user+0x9e/0x470 [ 2855.689571] ? finish_automount+0xa90/0xa90 [ 2855.690470] ? getname_flags.part.0+0x1dd/0x4f0 [ 2855.691437] ? _copy_from_user+0xfb/0x1b0 [ 2855.692312] __x64_sys_mount+0x282/0x300 [ 2855.693165] ? copy_mnt_ns+0xa00/0xa00 [ 2855.693987] do_syscall_64+0x33/0x40 [ 2855.694763] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2855.695832] RIP: 0033:0x7ff784b43b19 [ 2855.696614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2855.700483] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2855.702077] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2855.703566] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2855.705067] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2855.706557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2855.708058] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 [ 2855.718815] loop3: detected capacity change from 0 to 135266304 [ 2855.720894] tmpfs: Bad value for 'mpol' 23:11:34 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x24, 0x0, 0x1, 0x6b, 0x0, 0x1, 0x20001, 0xd, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x1, @perf_config_ext={0x8, 0xcc}, 0x11800, 0x1, 0x4b7, 0x1, 0x9a09, 0x5, 0x8, 0x0, 0x31babf72}, 0xffffffffffffffff, 0x5, r1, 0xa) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)={0x14, 0x1f, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) 23:11:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 61) 23:11:34 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x4, 0x6, 0x1, 0x7, 0x0, 0x6, 0x82a0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0xa8, 0x9, 0xac, 0x6, 0x0, 0xbc, 0x1, 0x0, 0x10001, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x0, 0x0, 0x1000002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0xa3) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xee, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d8, 0x1, @perf_bp={&(0x7f0000000040), 0xb}, 0x12, 0x7, 0x5e9, 0x1, 0x6ed4, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x35b6}, 0xffffffffffffffff, 0x10, r0, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) [ 2855.900182] FAULT_INJECTION: forcing a failure. [ 2855.900182] name failslab, interval 1, probability 0, space 0, times 0 [ 2855.902862] CPU: 0 PID: 13145 Comm: syz-executor.6 Not tainted 5.10.234 #1 [ 2855.904417] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2855.906184] Call Trace: [ 2855.906759] dump_stack+0x107/0x167 [ 2855.907529] should_fail.cold+0x5/0xa [ 2855.908335] ? create_object.isra.0+0x3a/0xa20 [ 2855.909304] should_failslab+0x5/0x20 [ 2855.910105] kmem_cache_alloc+0x5b/0x310 [ 2855.910960] create_object.isra.0+0x3a/0xa20 [ 2855.911897] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2855.912985] __kmalloc_track_caller+0x177/0x370 [ 2855.913967] ? kstrdup_const+0x53/0x80 [ 2855.914789] kstrdup+0x36/0x70 [ 2855.915467] kstrdup_const+0x53/0x80 [ 2855.916316] __kernfs_new_node+0x9d/0x860 [ 2855.917212] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2855.918229] ? lock_acquire+0x197/0x470 [ 2855.919066] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2855.920177] ? lock_release+0x680/0x680 [ 2855.921017] ? find_held_lock+0x2c/0x110 [ 2855.921873] kernfs_new_node+0x18d/0x250 [ 2855.922733] kernfs_create_dir_ns+0x49/0x160 [ 2855.923659] sysfs_create_dir_ns+0x127/0x290 [ 2855.924593] ? sysfs_create_mount_point+0xb0/0xb0 [ 2855.925605] ? rwlock_bug.part.0+0x90/0x90 [ 2855.926493] ? do_raw_spin_unlock+0x4f/0x220 [ 2855.927414] kobject_add_internal+0x25e/0xa30 [ 2855.928364] kobject_init_and_add+0x101/0x160 [ 2855.929309] ? kobject_create_and_add+0xb0/0xb0 [ 2855.930290] ? wait_for_completion_io+0x270/0x270 [ 2855.931294] ? kernfs_name_hash+0xe7/0x110 [ 2855.932179] ? kernfs_find_ns+0x256/0x380 [ 2855.933065] sysfs_slab_add+0x172/0x200 [ 2855.933907] __kmem_cache_create+0x3db/0x520 [ 2855.934833] kmem_cache_create_usercopy+0x1db/0x2f0 [ 2855.935883] p9_client_create+0xc6a/0x1230 [ 2855.936775] ? p9_client_flush+0x430/0x430 [ 2855.937675] ? trace_hardirqs_on+0x5b/0x180 [ 2855.938580] ? lockdep_init_map_type+0x2c7/0x780 [ 2855.939572] ? __raw_spin_lock_init+0x36/0x110 [ 2855.940531] v9fs_session_init+0x1dd/0x1680 [ 2855.941440] ? lock_release+0x680/0x680 [ 2855.942278] ? kmem_cache_alloc_trace+0x151/0x320 [ 2855.943288] ? v9fs_show_options+0x690/0x690 [ 2855.944211] ? trace_hardirqs_on+0x5b/0x180 [ 2855.945117] ? kasan_unpoison_shadow+0x33/0x50 [ 2855.946068] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2855.947131] v9fs_mount+0x79/0x8f0 [ 2855.947880] ? v9fs_write_inode+0x60/0x60 [ 2855.948757] legacy_get_tree+0x105/0x220 [ 2855.949612] vfs_get_tree+0x8e/0x300 [ 2855.950388] path_mount+0x1429/0x2120 [ 2855.951189] ? strncpy_from_user+0x9e/0x470 [ 2855.952099] ? finish_automount+0xa90/0xa90 [ 2855.953008] ? getname_flags.part.0+0x1dd/0x4f0 [ 2855.953978] ? _copy_from_user+0xfb/0x1b0 [ 2855.954856] __x64_sys_mount+0x282/0x300 [ 2855.955715] ? copy_mnt_ns+0xa00/0xa00 [ 2855.956536] do_syscall_64+0x33/0x40 [ 2855.957327] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 2855.958396] RIP: 0033:0x7ff784b43b19 [ 2855.959205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2855.963073] RSP: 002b:00007ff7820b9188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2855.964667] RAX: ffffffffffffffda RBX: 00007ff784c56f60 RCX: 00007ff784b43b19 [ 2855.966175] RDX: 00000000200000c0 RSI: 0000000020000380 RDI: 0000000000000000 [ 2855.967664] RBP: 00007ff7820b91d0 R08: 0000000020000280 R09: 0000000000000000 [ 2855.969171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2855.970668] R13: 00007ffd8139184f R14: 00007ff7820b9300 R15: 0000000000022000 VM DIAGNOSIS: 23:16:36 Registers: info registers vcpu 0 RAX=ffffffff83e7e9b0 RBX=0000000000000000 RCX=ffffffff83e6658c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7efb8 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85678508 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e9be RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000056469023bfd0 CR3=000000000deea000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000410bd60000000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e7e9b0 RBX=0000000000000001 RCX=ffffffff83e6658c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7efb8 RBP=0000000000000001 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85678508 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7e9be RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000056469024e228 CR3=000000000deea000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000008000000080000000000000000 XMM02=006e65672063657865080a0100010101 XMM03=636578650b007a7a7566206365786509 XMM04=696d20636578650d0065676169727420 XMM05=6e696820636578650a00657a696d696e XMM06=1100736465657320636578650a007374 XMM07=7472617473657220726f747563657865 XMM08=007a7a7566206365786509006e656720 XMM09=78650d0065676169727420636578650b XMM10=6578650a00657a696d696e696d206365 XMM11=657320636578650a0073746e69682063 XMM12=657220726f7475636578651100736465 XMM13=6e616320636578650e00737472617473 XMM14=616d7320636578650a00657461646964 XMM15=00006c61746f7420636578650a006873