7134dff11a8eed5b2647260584b90a1913e053f36e384a80a", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1163.574664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.577048] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1163.578088] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1163.584343] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1163.585292] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.586222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1163.587148] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1163.588330] hpet: Lost 1 RTC interrupts 10:13:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 7) 10:13:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 8) 10:13:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 4) 10:13:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1068) 10:13:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 7) 10:13:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e3", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a759", 0xc9, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1177.648012] FAULT_INJECTION: forcing a failure. [ 1177.648012] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.651617] CPU: 0 PID: 6925 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1177.652766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.653597] FAULT_INJECTION: forcing a failure. [ 1177.653597] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.653827] Call Trace: [ 1177.653846] dump_stack+0x107/0x167 [ 1177.653863] should_fail.cold+0x5/0xa [ 1177.656638] ? __d_alloc+0x2a/0x990 [ 1177.657093] should_failslab+0x5/0x20 [ 1177.657584] kmem_cache_alloc+0x5b/0x310 [ 1177.658088] ? mark_lock+0xf5/0x2df0 [ 1177.658591] __d_alloc+0x2a/0x990 [ 1177.659028] ? lock_acquire+0x197/0x470 [ 1177.659535] d_alloc_parallel+0x111/0x1bc0 [ 1177.660109] ? lock_downgrade+0x6d0/0x6d0 [ 1177.660664] ? find_held_lock+0x2c/0x110 [ 1177.661174] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1177.661731] ? __d_lookup+0x3bf/0x760 [ 1177.662202] ? lockdep_init_map_type+0x2c7/0x780 [ 1177.662864] ? lockdep_init_map_type+0x2c7/0x780 [ 1177.663470] proc_fill_cache+0x2f6/0x4a0 [ 1177.664011] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1177.664820] ? pid_update_inode+0xa0/0xa0 [ 1177.666066] ? pointer+0xa80/0xa80 [ 1177.667047] ? snprintf+0xbb/0x100 [ 1177.667936] proc_pid_readdir+0x3d3/0x830 [ 1177.669003] ? proc_pid_lookup+0x460/0x460 [ 1177.670091] ? inode_security+0x107/0x140 [ 1177.671117] proc_root_readdir+0xa0/0xd0 [ 1177.672153] iterate_dir+0x584/0x710 [ 1177.673268] __x64_sys_getdents64+0x13a/0x2c0 [ 1177.674370] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1177.675493] ? fput_many+0x2f/0x1a0 [ 1177.676474] ? fillonedir+0x4b0/0x4b0 [ 1177.677458] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1177.678781] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1177.680091] do_syscall_64+0x33/0x40 [ 1177.681158] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.682448] RIP: 0033:0x7f491c0d9b19 [ 1177.683392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.688795] RSP: 002b:00007f491964f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1177.690711] RAX: ffffffffffffffda RBX: 00007f491c1ecf60 RCX: 00007f491c0d9b19 [ 1177.692574] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000004 [ 1177.694379] RBP: 00007f491964f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.696191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.698005] R13: 00007ffca8d3deef R14: 00007f491964f300 R15: 0000000000022000 [ 1177.699865] CPU: 1 PID: 6934 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1177.700840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.701913] Call Trace: [ 1177.702256] dump_stack+0x107/0x167 [ 1177.702737] should_fail.cold+0x5/0xa [ 1177.703256] ? __d_alloc+0x2a/0x990 [ 1177.703726] should_failslab+0x5/0x20 [ 1177.704330] kmem_cache_alloc+0x5b/0x310 [ 1177.704850] ? mark_lock+0xf5/0x2df0 [ 1177.705330] __d_alloc+0x2a/0x990 [ 1177.705800] ? lock_acquire+0x197/0x470 [ 1177.706306] d_alloc_parallel+0x111/0x1bc0 [ 1177.706889] ? lock_downgrade+0x6d0/0x6d0 [ 1177.707418] ? find_held_lock+0x2c/0x110 [ 1177.707945] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1177.708491] ? __d_lookup+0x3bf/0x760 [ 1177.709010] ? lockdep_init_map_type+0x2c7/0x780 [ 1177.709613] ? lockdep_init_map_type+0x2c7/0x780 [ 1177.710265] proc_fill_cache+0x2f6/0x4a0 [ 1177.710782] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1177.711546] ? pid_update_inode+0xa0/0xa0 [ 1177.712103] ? pointer+0xa80/0xa80 [ 1177.712150] hpet: Lost 3 RTC interrupts [ 1177.712603] ? snprintf+0xbb/0x100 [ 1177.713599] proc_pid_readdir+0x3d3/0x830 [ 1177.714140] ? proc_pid_lookup+0x460/0x460 [ 1177.714700] ? dualshock4_get_calibration_data+0xbe3/0x1530 [ 1177.715419] ? inode_security+0x107/0x140 [ 1177.715984] proc_root_readdir+0xa0/0xd0 [ 1177.716517] iterate_dir+0x584/0x710 [ 1177.717043] __x64_sys_getdents64+0x13a/0x2c0 [ 1177.717616] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1177.718212] ? fput_many+0x2f/0x1a0 [ 1177.718673] ? fillonedir+0x4b0/0x4b0 [ 1177.719161] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1177.719833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1177.720513] do_syscall_64+0x33/0x40 [ 1177.720990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.721642] RIP: 0033:0x7f85507e0b19 [ 1177.722117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.725799] FAULT_INJECTION: forcing a failure. [ 1177.725799] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.728352] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1177.728368] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1177.728375] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1177.728383] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.728397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.744425] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1177.745365] CPU: 0 PID: 6936 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1177.746326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.747444] Call Trace: [ 1177.747787] dump_stack+0x107/0x167 [ 1177.748271] should_fail.cold+0x5/0xa [ 1177.748792] ? create_object.isra.0+0x3a/0xa20 [ 1177.749383] should_failslab+0x5/0x20 [ 1177.749906] kmem_cache_alloc+0x5b/0x310 [ 1177.750442] create_object.isra.0+0x3a/0xa20 [ 1177.751003] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1177.751657] kmem_cache_alloc+0x159/0x310 [ 1177.752235] ? proc_free_inode+0x20/0x20 [ 1177.752759] proc_alloc_inode+0x18/0x200 [ 1177.753318] ? proc_free_inode+0x20/0x20 [ 1177.753837] alloc_inode+0x63/0x240 [ 1177.754303] new_inode+0x23/0x250 [ 1177.754753] proc_pid_make_inode+0x22/0x220 [ 1177.755307] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1177.756071] proc_pid_instantiate+0x50/0x1e0 [ 1177.756648] proc_fill_cache+0x373/0x4a0 [ 1177.757211] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1177.757977] ? pid_update_inode+0xa0/0xa0 [ 1177.758504] ? pointer+0xa80/0xa80 [ 1177.758998] ? snprintf+0xbb/0x100 [ 1177.759466] proc_pid_readdir+0x3d3/0x830 [ 1177.760009] ? proc_pid_lookup+0x460/0x460 [ 1177.760564] ? down_read+0x191/0x430 [ 1177.761038] ? inode_security+0x107/0x140 [ 1177.761576] proc_root_readdir+0xa0/0xd0 [ 1177.762121] iterate_dir+0x584/0x710 [ 1177.762600] __x64_sys_getdents64+0x13a/0x2c0 [ 1177.763218] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1177.763799] ? fput_many+0x2f/0x1a0 [ 1177.764281] ? fillonedir+0x4b0/0x4b0 [ 1177.764799] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1177.765471] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1177.766138] do_syscall_64+0x33/0x40 [ 1177.766615] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.767267] RIP: 0033:0x7ff93dd2bb19 [ 1177.767743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.770165] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1177.771135] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1177.772075] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1177.773034] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.773945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.774873] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1177.775993] hpet: Lost 1 RTC interrupts [ 1177.780512] loop3: detected capacity change from 0 to 135266304 10:13:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1177.818266] FAULT_INJECTION: forcing a failure. [ 1177.818266] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.819932] CPU: 0 PID: 6942 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1177.820801] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.821840] Call Trace: [ 1177.822193] dump_stack+0x107/0x167 [ 1177.822664] should_fail.cold+0x5/0xa [ 1177.823154] ? create_object.isra.0+0x3a/0xa20 [ 1177.823732] should_failslab+0x5/0x20 [ 1177.832868] kmem_cache_alloc+0x5b/0x310 [ 1177.834109] create_object.isra.0+0x3a/0xa20 [ 1177.835435] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1177.836986] kmem_cache_alloc+0x159/0x310 [ 1177.838240] ? mark_lock+0xf5/0x2df0 [ 1177.839345] __d_alloc+0x2a/0x990 [ 1177.840404] ? lock_acquire+0x197/0x470 [ 1177.841624] d_alloc_parallel+0x111/0x1bc0 [ 1177.842893] ? lock_downgrade+0x6d0/0x6d0 [ 1177.844160] ? find_held_lock+0x2c/0x110 [ 1177.845427] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1177.846658] ? __d_lookup+0x3bf/0x760 [ 1177.847795] ? lockdep_init_map_type+0x2c7/0x780 [ 1177.849251] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1177.850822] ? lockdep_init_map_type+0x2c7/0x780 [ 1177.852293] proc_fill_cache+0x2f6/0x4a0 [ 1177.853539] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1177.855427] ? pid_update_inode+0xa0/0xa0 [ 1177.856692] ? pointer+0xa80/0xa80 [ 1177.857805] ? snprintf+0xbb/0x100 [ 1177.858875] proc_pid_readdir+0x3d3/0x830 [ 1177.860147] ? proc_pid_lookup+0x460/0x460 [ 1177.861432] ? inode_security+0x107/0x140 [ 1177.862664] proc_root_readdir+0xa0/0xd0 [ 1177.863907] iterate_dir+0x584/0x710 [ 1177.865080] __x64_sys_getdents64+0x13a/0x2c0 [ 1177.866383] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1177.867703] ? fput_many+0x2f/0x1a0 [ 1177.868796] ? fillonedir+0x4b0/0x4b0 [ 1177.869994] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1177.871557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1177.877104] do_syscall_64+0x33/0x40 [ 1177.878192] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.879734] RIP: 0033:0x7f66eeb7db19 [ 1177.880889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.886537] RSP: 002b:00007f66ec0f3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1177.888845] RAX: ffffffffffffffda RBX: 00007f66eec90f60 RCX: 00007f66eeb7db19 [ 1177.891006] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1177.893153] RBP: 00007f66ec0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.895315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1177.897762] R13: 00007ffd3dbcec4f R14: 00007f66ec0f3300 R15: 0000000000022000 [ 1177.900288] hpet: Lost 4 RTC interrupts 10:13:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a759", 0xc9, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1177.993570] loop3: detected capacity change from 0 to 135266304 [ 1178.864263] hpet: Lost 1 RTC interrupts [ 1180.200255] hpet: Lost 1 RTC interrupts [ 1180.612310] hpet: Lost 1 RTC interrupts [ 1191.678899] loop3: detected capacity change from 0 to 135266304 10:13:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 9) 10:13:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x106c) 10:13:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 5) 10:13:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 8) 10:13:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 8) 10:13:38 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa", 0xd7, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1191.692959] FAULT_INJECTION: forcing a failure. [ 1191.692959] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.694527] CPU: 1 PID: 6968 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1191.695375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1191.696472] Call Trace: [ 1191.696824] dump_stack+0x107/0x167 [ 1191.697278] should_fail.cold+0x5/0xa [ 1191.697763] ? create_object.isra.0+0x3a/0xa20 [ 1191.698343] should_failslab+0x5/0x20 [ 1191.698819] kmem_cache_alloc+0x5b/0x310 [ 1191.699328] create_object.isra.0+0x3a/0xa20 [ 1191.699874] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1191.700595] kmem_cache_alloc+0x159/0x310 [ 1191.701113] ? mark_lock+0xf5/0x2df0 [ 1191.701580] __d_alloc+0x2a/0x990 [ 1191.702007] ? lock_acquire+0x197/0x470 [ 1191.702512] d_alloc_parallel+0x111/0x1bc0 [ 1191.703038] ? lock_downgrade+0x6d0/0x6d0 [ 1191.703554] ? find_held_lock+0x2c/0x110 [ 1191.704064] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1191.704591] ? __d_lookup+0x3bf/0x760 [ 1191.705095] ? lockdep_init_map_type+0x2c7/0x780 [ 1191.705709] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1191.706396] ? lockdep_init_map_type+0x2c7/0x780 [ 1191.707014] proc_fill_cache+0x2f6/0x4a0 [ 1191.707556] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1191.708326] ? pid_update_inode+0xa0/0xa0 [ 1191.709532] ? pointer+0xa80/0xa80 [ 1191.709627] FAULT_INJECTION: forcing a failure. [ 1191.709627] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.710418] ? snprintf+0xbb/0x100 [ 1191.710448] proc_pid_readdir+0x3d3/0x830 [ 1191.710466] ? proc_pid_lookup+0x460/0x460 [ 1191.710479] ? dualshock4_get_calibration_data+0xbe3/0x1530 [ 1191.710490] ? inode_security+0x107/0x140 [ 1191.710511] proc_root_readdir+0xa0/0xd0 [ 1191.710525] iterate_dir+0x584/0x710 [ 1191.710543] __x64_sys_getdents64+0x13a/0x2c0 [ 1191.724492] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1191.725062] ? fput_many+0x2f/0x1a0 [ 1191.725530] ? fillonedir+0x4b0/0x4b0 [ 1191.726010] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1191.726679] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1191.727352] do_syscall_64+0x33/0x40 [ 1191.727836] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1191.728504] RIP: 0033:0x7f85507e0b19 [ 1191.728973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.731294] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1191.732260] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1191.737182] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1191.738085] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1191.738983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.739892] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1191.740839] CPU: 0 PID: 6955 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1191.741773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1191.742833] Call Trace: [ 1191.743193] dump_stack+0x107/0x167 [ 1191.743694] should_fail.cold+0x5/0xa [ 1191.744186] ? create_object.isra.0+0x3a/0xa20 [ 1191.744794] should_failslab+0x5/0x20 [ 1191.745288] kmem_cache_alloc+0x5b/0x310 [ 1191.745829] create_object.isra.0+0x3a/0xa20 [ 1191.746395] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1191.747045] kmem_cache_alloc+0x159/0x310 [ 1191.747606] __d_alloc+0x2a/0x990 [ 1191.748051] ? lock_acquire+0x197/0x470 [ 1191.748595] d_alloc_parallel+0x111/0x1bc0 [ 1191.749139] ? lock_downgrade+0x6d0/0x6d0 [ 1191.749691] ? find_held_lock+0x2c/0x110 [ 1191.750218] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1191.750756] ? __d_lookup+0x3bf/0x760 [ 1191.751247] ? lockdep_init_map_type+0x2c7/0x780 [ 1191.751847] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1191.752549] ? lockdep_init_map_type+0x2c7/0x780 [ 1191.753162] proc_fill_cache+0x2f6/0x4a0 [ 1191.753680] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1191.754451] ? pid_update_inode+0xa0/0xa0 [ 1191.754980] ? pointer+0xa80/0xa80 [ 1191.755443] ? snprintf+0xbb/0x100 [ 1191.755910] proc_pid_readdir+0x3d3/0x830 [ 1191.756474] ? proc_pid_lookup+0x460/0x460 [ 1191.757016] ? inode_security+0x107/0x140 [ 1191.757556] proc_root_readdir+0xa0/0xd0 [ 1191.758076] iterate_dir+0x584/0x710 [ 1191.758560] __x64_sys_getdents64+0x13a/0x2c0 [ 1191.759136] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1191.759716] ? fput_many+0x2f/0x1a0 [ 1191.760178] ? fillonedir+0x4b0/0x4b0 [ 1191.764319] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1191.765003] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1191.765665] do_syscall_64+0x33/0x40 [ 1191.766141] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1191.766795] RIP: 0033:0x7f491c0d9b19 [ 1191.767273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.769670] RSP: 002b:00007f491964f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1191.770642] RAX: ffffffffffffffda RBX: 00007f491c1ecf60 RCX: 00007f491c0d9b19 [ 1191.771576] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000004 [ 1191.772544] RBP: 00007f491964f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1191.773457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.774366] R13: 00007ffca8d3deef R14: 00007f491964f300 R15: 0000000000022000 [ 1191.775460] hpet: Lost 1 RTC interrupts 10:13:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 9) [ 1191.784791] FAULT_INJECTION: forcing a failure. [ 1191.784791] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1191.786561] CPU: 0 PID: 6962 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1191.787471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1191.788587] Call Trace: [ 1191.788952] dump_stack+0x107/0x167 [ 1191.789456] should_fail.cold+0x5/0xa [ 1191.789980] __alloc_pages_nodemask+0x182/0x600 [ 1191.790618] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1191.791403] alloc_pages_current+0x187/0x280 [ 1191.791969] allocate_slab+0x26f/0x380 [ 1191.792498] ___slab_alloc+0x470/0x700 [ 1191.792996] ? create_object.isra.0+0x3a/0xa20 [ 1191.793587] ? find_held_lock+0x2c/0x110 [ 1191.794112] ? create_object.isra.0+0x3a/0xa20 [ 1191.794698] ? kmem_cache_alloc+0x301/0x310 [ 1191.795248] ? create_object.isra.0+0x3a/0xa20 [ 1191.795832] kmem_cache_alloc+0x301/0x310 [ 1191.796402] create_object.isra.0+0x3a/0xa20 [ 1191.796963] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1191.797619] kmem_cache_alloc+0x159/0x310 [ 1191.798148] ? proc_free_inode+0x20/0x20 [ 1191.798677] proc_alloc_inode+0x18/0x200 [ 1191.799195] ? proc_free_inode+0x20/0x20 [ 1191.799715] alloc_inode+0x63/0x240 10:13:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1191.800182] new_inode+0x23/0x250 [ 1191.800653] proc_pid_make_inode+0x22/0x220 [ 1191.801209] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1191.801943] proc_pid_instantiate+0x50/0x1e0 [ 1191.802640] proc_fill_cache+0x373/0x4a0 [ 1191.803158] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1191.803925] ? pid_update_inode+0xa0/0xa0 [ 1191.804491] ? pointer+0xa80/0xa80 [ 1191.804954] ? snprintf+0xbb/0x100 [ 1191.805426] proc_pid_readdir+0x3d3/0x830 [ 1191.805957] ? proc_pid_lookup+0x460/0x460 [ 1191.806500] ? down_read+0x191/0x430 [ 1191.806973] ? inode_security+0x107/0x140 [ 1191.807510] proc_root_readdir+0xa0/0xd0 [ 1191.808030] iterate_dir+0x584/0x710 [ 1191.808532] __x64_sys_getdents64+0x13a/0x2c0 [ 1191.809108] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1191.809690] ? fput_many+0x2f/0x1a0 [ 1191.810150] ? fillonedir+0x4b0/0x4b0 [ 1191.810687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1191.811388] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1191.812047] do_syscall_64+0x33/0x40 [ 1191.812547] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1191.813200] RIP: 0033:0x7ff93dd2bb19 [ 1191.813678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.816063] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1191.817056] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1191.817967] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1191.818876] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1191.819791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.820733] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1191.821913] hpet: Lost 1 RTC interrupts [ 1191.826115] FAULT_INJECTION: forcing a failure. [ 1191.826115] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.827806] CPU: 0 PID: 6966 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1191.828745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1191.829836] Call Trace: [ 1191.830193] dump_stack+0x107/0x167 [ 1191.830714] should_fail.cold+0x5/0xa [ 1191.831220] ? proc_alloc_inode+0x18/0x200 [ 1191.831836] should_failslab+0x5/0x20 [ 1191.832340] kmem_cache_alloc+0x5b/0x310 [ 1191.832873] ? proc_free_inode+0x20/0x20 [ 1191.833422] proc_alloc_inode+0x18/0x200 [ 1191.833960] ? proc_free_inode+0x20/0x20 [ 1191.834480] alloc_inode+0x63/0x240 [ 1191.834950] new_inode+0x23/0x250 [ 1191.835405] proc_pid_make_inode+0x22/0x220 10:13:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1191.835957] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1191.836717] proc_pid_instantiate+0x50/0x1e0 [ 1191.837286] proc_fill_cache+0x373/0x4a0 [ 1191.837808] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1191.838582] ? pid_update_inode+0xa0/0xa0 [ 1191.839110] ? pointer+0xa80/0xa80 [ 1191.839577] ? snprintf+0xbb/0x100 [ 1191.840046] proc_pid_readdir+0x3d3/0x830 [ 1191.840776] ? proc_pid_lookup+0x460/0x460 [ 1191.841319] ? inode_security+0x107/0x140 [ 1191.841860] proc_root_readdir+0xa0/0xd0 [ 1191.842383] iterate_dir+0x584/0x710 [ 1191.842868] __x64_sys_getdents64+0x13a/0x2c0 [ 1191.843474] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1191.844052] ? fput_many+0x2f/0x1a0 [ 1191.844586] ? fillonedir+0x4b0/0x4b0 [ 1191.845083] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1191.845777] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1191.846442] do_syscall_64+0x33/0x40 [ 1191.846918] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1191.847576] RIP: 0033:0x7f66eeb7db19 [ 1191.848052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.850455] RSP: 002b:00007f66ec0f3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1191.851427] RAX: ffffffffffffffda RBX: 00007f66eec90f60 RCX: 00007f66eeb7db19 [ 1191.852458] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1191.854232] RBP: 00007f66ec0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1191.855989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.858093] R13: 00007ffd3dbcec4f R14: 00007f66ec0f3300 R15: 0000000000022000 [ 1191.859800] hpet: Lost 1 RTC interrupts 10:13:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a8", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1191.907924] FAULT_INJECTION: forcing a failure. [ 1191.907924] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.911249] CPU: 0 PID: 6978 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1191.913116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1191.915219] Call Trace: [ 1191.915914] dump_stack+0x107/0x167 [ 1191.916974] should_fail.cold+0x5/0xa [ 1191.917902] ? proc_alloc_inode+0x18/0x200 [ 1191.918933] should_failslab+0x5/0x20 [ 1191.919865] kmem_cache_alloc+0x5b/0x310 [ 1191.921021] ? proc_free_inode+0x20/0x20 [ 1191.922043] proc_alloc_inode+0x18/0x200 [ 1191.923056] ? proc_free_inode+0x20/0x20 [ 1191.924071] alloc_inode+0x63/0x240 [ 1191.925138] new_inode+0x23/0x250 [ 1191.925995] proc_pid_make_inode+0x22/0x220 [ 1191.927051] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1191.928539] proc_pid_instantiate+0x50/0x1e0 [ 1191.929649] proc_fill_cache+0x373/0x4a0 [ 1191.930663] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1191.932183] ? pid_update_inode+0xa0/0xa0 [ 1191.933425] ? pointer+0xa80/0xa80 [ 1191.934299] ? snprintf+0xbb/0x100 [ 1191.935215] proc_pid_readdir+0x3d3/0x830 [ 1191.936242] ? proc_pid_lookup+0x460/0x460 [ 1191.937565] ? dualshock4_get_calibration_data+0xbe3/0x1530 [ 1191.939030] ? inode_security+0x107/0x140 [ 1191.940080] proc_root_readdir+0xa0/0xd0 [ 1191.940731] iterate_dir+0x584/0x710 [ 1191.941221] __x64_sys_getdents64+0x13a/0x2c0 [ 1191.941800] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1191.942380] ? fput_many+0x2f/0x1a0 [ 1191.942846] ? fillonedir+0x4b0/0x4b0 [ 1191.943337] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 10:13:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 9) [ 1191.944013] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1191.945183] do_syscall_64+0x33/0x40 [ 1191.946092] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1191.947342] RIP: 0033:0x7f85507e0b19 [ 1191.948252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.953951] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1191.955870] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1191.957952] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1191.959735] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1191.961805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.963637] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1191.965961] hpet: Lost 3 RTC interrupts [ 1192.040887] FAULT_INJECTION: forcing a failure. [ 1192.040887] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.045211] CPU: 1 PID: 6984 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1192.046071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.047093] Call Trace: [ 1192.047429] dump_stack+0x107/0x167 [ 1192.047912] should_fail.cold+0x5/0xa [ 1192.048401] ? proc_alloc_inode+0x18/0x200 [ 1192.048934] should_failslab+0x5/0x20 [ 1192.049410] kmem_cache_alloc+0x5b/0x310 [ 1192.049916] ? proc_free_inode+0x20/0x20 [ 1192.050421] proc_alloc_inode+0x18/0x200 [ 1192.050923] ? proc_free_inode+0x20/0x20 [ 1192.051428] alloc_inode+0x63/0x240 [ 1192.051879] new_inode+0x23/0x250 [ 1192.052328] proc_pid_make_inode+0x22/0x220 [ 1192.052901] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1192.053611] proc_pid_instantiate+0x50/0x1e0 [ 1192.054203] proc_fill_cache+0x373/0x4a0 [ 1192.054707] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1192.055452] ? pid_update_inode+0xa0/0xa0 [ 1192.055965] ? pointer+0xa80/0xa80 [ 1192.056434] ? snprintf+0xbb/0x100 [ 1192.056925] proc_pid_readdir+0x3d3/0x830 [ 1192.057445] ? proc_pid_lookup+0x460/0x460 [ 1192.058011] ? inode_security+0x107/0x140 [ 1192.058537] proc_root_readdir+0xa0/0xd0 [ 1192.059046] iterate_dir+0x584/0x710 [ 1192.059516] __x64_sys_getdents64+0x13a/0x2c0 [ 1192.060074] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1192.064650] ? fput_many+0x2f/0x1a0 [ 1192.065103] ? fillonedir+0x4b0/0x4b0 [ 1192.065587] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1192.066241] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1192.066890] do_syscall_64+0x33/0x40 [ 1192.067355] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1192.067994] RIP: 0033:0x7f491c0d9b19 [ 1192.068471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1192.070780] RSP: 002b:00007f491964f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1192.071723] RAX: ffffffffffffffda RBX: 00007f491c1ecf60 RCX: 00007f491c0d9b19 [ 1192.072668] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000004 [ 1192.073552] RBP: 00007f491964f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1192.074434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1192.075344] R13: 00007ffca8d3deef R14: 00007f491964f300 R15: 0000000000022000 10:13:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 10) 10:13:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 10) 10:13:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa", 0xd7, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1205.555002] loop3: detected capacity change from 0 to 135266304 10:13:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 6) 10:13:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 10) 10:13:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1074) 10:13:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1205.573841] FAULT_INJECTION: forcing a failure. [ 1205.573841] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.575386] CPU: 1 PID: 6997 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1205.576289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1205.577405] Call Trace: [ 1205.577750] dump_stack+0x107/0x167 [ 1205.578220] should_fail.cold+0x5/0xa [ 1205.578717] ? create_object.isra.0+0x3a/0xa20 [ 1205.579304] should_failslab+0x5/0x20 [ 1205.579797] kmem_cache_alloc+0x5b/0x310 [ 1205.580323] create_object.isra.0+0x3a/0xa20 [ 1205.580909] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1205.581565] kmem_cache_alloc+0x159/0x310 [ 1205.582098] ? proc_free_inode+0x20/0x20 [ 1205.582627] proc_alloc_inode+0x18/0x200 [ 1205.583149] ? proc_free_inode+0x20/0x20 [ 1205.583672] alloc_inode+0x63/0x240 [ 1205.584139] new_inode+0x23/0x250 [ 1205.584608] proc_pid_make_inode+0x22/0x220 [ 1205.585177] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.585867] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1205.586649] proc_pid_instantiate+0x50/0x1e0 [ 1205.590813] proc_fill_cache+0x373/0x4a0 [ 1205.591621] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1205.592449] ? pid_update_inode+0xa0/0xa0 [ 1205.593006] ? pointer+0xa80/0xa80 [ 1205.593555] ? snprintf+0xbb/0x100 [ 1205.594021] proc_pid_readdir+0x3d3/0x830 [ 1205.594669] ? proc_pid_lookup+0x460/0x460 [ 1205.595369] ? inode_security+0x107/0x140 [ 1205.595911] proc_root_readdir+0xa0/0xd0 [ 1205.596437] iterate_dir+0x584/0x710 [ 1205.596931] __x64_sys_getdents64+0x13a/0x2c0 [ 1205.597532] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1205.598104] ? fput_many+0x2f/0x1a0 [ 1205.598605] ? fillonedir+0x4b0/0x4b0 [ 1205.599093] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.599760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1205.600414] do_syscall_64+0x33/0x40 [ 1205.600907] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1205.601577] RIP: 0033:0x7f491c0d9b19 [ 1205.602046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.604426] RSP: 002b:00007f491964f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1205.605414] RAX: ffffffffffffffda RBX: 00007f491c1ecf60 RCX: 00007f491c0d9b19 [ 1205.606327] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000004 [ 1205.607258] RBP: 00007f491964f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1205.608163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1205.609085] R13: 00007ffca8d3deef R14: 00007f491964f300 R15: 0000000000022000 [ 1205.615737] FAULT_INJECTION: forcing a failure. [ 1205.615737] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.621454] CPU: 0 PID: 6998 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1205.622362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1205.623452] Call Trace: [ 1205.623808] dump_stack+0x107/0x167 [ 1205.624280] should_fail.cold+0x5/0xa [ 1205.624800] ? create_object.isra.0+0x3a/0xa20 [ 1205.625392] should_failslab+0x5/0x20 [ 1205.625880] kmem_cache_alloc+0x5b/0x310 [ 1205.626408] create_object.isra.0+0x3a/0xa20 [ 1205.626965] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1205.627623] kmem_cache_alloc+0x159/0x310 [ 1205.628158] ? proc_free_inode+0x20/0x20 [ 1205.628717] proc_alloc_inode+0x18/0x200 [ 1205.629256] ? proc_free_inode+0x20/0x20 [ 1205.629775] alloc_inode+0x63/0x240 [ 1205.630240] new_inode+0x23/0x250 [ 1205.630689] proc_pid_make_inode+0x22/0x220 [ 1205.631238] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.631954] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1205.632835] proc_pid_instantiate+0x50/0x1e0 [ 1205.637000] proc_fill_cache+0x373/0x4a0 [ 1205.637519] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1205.638283] ? pid_update_inode+0xa0/0xa0 [ 1205.638812] ? pointer+0xa80/0xa80 [ 1205.639270] ? snprintf+0xbb/0x100 [ 1205.639748] proc_pid_readdir+0x3d3/0x830 [ 1205.640284] ? proc_pid_lookup+0x460/0x460 [ 1205.640838] ? dualshock4_get_calibration_data+0xbe3/0x1530 [ 1205.641559] ? inode_security+0x107/0x140 [ 1205.642120] proc_root_readdir+0xa0/0xd0 [ 1205.642643] iterate_dir+0x584/0x710 [ 1205.643121] __x64_sys_getdents64+0x13a/0x2c0 [ 1205.643702] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1205.644282] ? fput_many+0x2f/0x1a0 [ 1205.644759] ? fillonedir+0x4b0/0x4b0 [ 1205.645252] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.645922] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1205.646586] do_syscall_64+0x33/0x40 [ 1205.647059] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1205.647719] RIP: 0033:0x7f85507e0b19 [ 1205.648194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.650558] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1205.651533] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1205.652451] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1205.653371] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1205.654284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1205.655195] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1205.656255] hpet: Lost 2 RTC interrupts [ 1205.659185] FAULT_INJECTION: forcing a failure. [ 1205.659185] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.660864] CPU: 1 PID: 7002 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1205.661762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1205.662847] Call Trace: [ 1205.663209] dump_stack+0x107/0x167 [ 1205.663751] should_fail.cold+0x5/0xa [ 1205.664267] ? create_object.isra.0+0x3a/0xa20 [ 1205.664889] should_failslab+0x5/0x20 [ 1205.665394] kmem_cache_alloc+0x5b/0x310 [ 1205.665930] create_object.isra.0+0x3a/0xa20 [ 1205.666521] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1205.667170] kmem_cache_alloc+0x159/0x310 [ 1205.667748] ? proc_free_inode+0x20/0x20 [ 1205.668280] proc_alloc_inode+0x18/0x200 [ 1205.668811] ? proc_free_inode+0x20/0x20 [ 1205.669331] alloc_inode+0x63/0x240 [ 1205.669806] new_inode+0x23/0x250 [ 1205.670413] proc_pid_make_inode+0x22/0x220 [ 1205.671294] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1205.672890] proc_pid_instantiate+0x50/0x1e0 [ 1205.673998] proc_fill_cache+0x373/0x4a0 [ 1205.675013] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1205.676625] ? pid_update_inode+0xa0/0xa0 [ 1205.677663] ? pointer+0xa80/0xa80 [ 1205.678558] ? snprintf+0xbb/0x100 [ 1205.679496] proc_pid_readdir+0x3d3/0x830 [ 1205.680624] ? proc_pid_lookup+0x460/0x460 [ 1205.681682] ? inode_security+0x107/0x140 [ 1205.682724] proc_root_readdir+0xa0/0xd0 [ 1205.683797] iterate_dir+0x584/0x710 [ 1205.684834] __x64_sys_getdents64+0x13a/0x2c0 [ 1205.685958] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1205.687127] ? fput_many+0x2f/0x1a0 [ 1205.688077] ? fillonedir+0x4b0/0x4b0 [ 1205.692749] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.694570] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1205.695964] do_syscall_64+0x33/0x40 [ 1205.697092] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1205.698582] RIP: 0033:0x7f66eeb7db19 [ 1205.699545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.705104] RSP: 002b:00007f66ec0f3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1205.707039] RAX: ffffffffffffffda RBX: 00007f66eec90f60 RCX: 00007f66eeb7db19 [ 1205.708958] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1205.710776] RBP: 00007f66ec0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1205.712869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1205.714793] R13: 00007ffd3dbcec4f R14: 00007f66ec0f3300 R15: 0000000000022000 [ 1205.718378] FAULT_INJECTION: forcing a failure. [ 1205.718378] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.721607] CPU: 1 PID: 6996 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1205.723576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1205.725091] Call Trace: [ 1205.725430] dump_stack+0x107/0x167 [ 1205.725896] should_fail.cold+0x5/0xa [ 1205.726382] ? create_object.isra.0+0x3a/0xa20 [ 1205.726995] should_failslab+0x5/0x20 [ 1205.727479] kmem_cache_alloc+0x5b/0x310 [ 1205.728044] create_object.isra.0+0x3a/0xa20 [ 1205.728662] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1205.729317] kmem_cache_alloc+0x159/0x310 [ 1205.729852] security_inode_alloc+0x34/0x160 [ 1205.730421] inode_init_always+0xa4e/0xd10 [ 1205.730986] ? proc_free_inode+0x20/0x20 [ 1205.731507] alloc_inode+0x84/0x240 [ 1205.732011] new_inode+0x23/0x250 [ 1205.732494] proc_pid_make_inode+0x22/0x220 [ 1205.733788] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.735127] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1205.736671] proc_pid_instantiate+0x50/0x1e0 [ 1205.737771] proc_fill_cache+0x373/0x4a0 [ 1205.738809] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1205.740353] ? pid_update_inode+0xa0/0xa0 [ 1205.741559] ? pointer+0xa80/0xa80 [ 1205.742463] ? snprintf+0xbb/0x100 [ 1205.743418] proc_pid_readdir+0x3d3/0x830 [ 1205.744573] ? proc_pid_lookup+0x460/0x460 [ 1205.745623] ? down_read+0x191/0x430 [ 1205.746537] ? inode_security+0x107/0x140 [ 1205.747570] proc_root_readdir+0xa0/0xd0 [ 1205.748616] iterate_dir+0x584/0x710 [ 1205.749549] __x64_sys_getdents64+0x13a/0x2c0 [ 1205.750667] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1205.751804] ? fput_many+0x2f/0x1a0 [ 1205.752784] ? fillonedir+0x4b0/0x4b0 [ 1205.753737] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.755047] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1205.756339] do_syscall_64+0x33/0x40 [ 1205.757418] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1205.758704] RIP: 0033:0x7ff93dd2bb19 [ 1205.759630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.765195] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1205.767137] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1205.769078] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1205.770903] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1205.772810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1205.774679] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1205.784589] hpet: Lost 5 RTC interrupts 10:13:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa", 0xd7, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:13:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x107a) [ 1205.837609] loop3: detected capacity change from 0 to 135266304 [ 1205.912840] FAULT_INJECTION: forcing a failure. [ 1205.912840] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1205.914287] FAULT_INJECTION: forcing a failure. [ 1205.914287] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.914495] CPU: 0 PID: 7022 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1205.916774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1205.917862] Call Trace: [ 1205.918239] dump_stack+0x107/0x167 [ 1205.918731] should_fail.cold+0x5/0xa [ 1205.919227] __alloc_pages_nodemask+0x182/0x600 [ 1205.919848] ? __alloc_pages_slowpath.constprop.0+0x2200/0x2200 [ 1205.920671] alloc_pages_current+0x187/0x280 [ 1205.921244] allocate_slab+0x26f/0x380 [ 1205.921770] ___slab_alloc+0x470/0x700 [ 1205.922273] ? create_object.isra.0+0x3a/0xa20 [ 1205.922882] ? find_held_lock+0x2c/0x110 [ 1205.923412] ? create_object.isra.0+0x3a/0xa20 [ 1205.924034] ? kmem_cache_alloc+0x301/0x310 [ 1205.924621] ? create_object.isra.0+0x3a/0xa20 [ 1205.925211] kmem_cache_alloc+0x301/0x310 [ 1205.925770] create_object.isra.0+0x3a/0xa20 [ 1205.926331] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1205.927004] kmem_cache_alloc+0x159/0x310 [ 1205.927556] ? proc_free_inode+0x20/0x20 [ 1205.928078] proc_alloc_inode+0x18/0x200 [ 1205.928629] ? proc_free_inode+0x20/0x20 [ 1205.929149] alloc_inode+0x63/0x240 [ 1205.929628] new_inode+0x23/0x250 [ 1205.930084] proc_pid_make_inode+0x22/0x220 [ 1205.930654] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.931326] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1205.932079] proc_pid_instantiate+0x50/0x1e0 [ 1205.932682] proc_fill_cache+0x373/0x4a0 [ 1205.933226] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1205.934032] ? pid_update_inode+0xa0/0xa0 [ 1205.934595] ? pointer+0xa80/0xa80 [ 1205.935059] ? snprintf+0xbb/0x100 [ 1205.935547] proc_pid_readdir+0x3d3/0x830 [ 1205.936087] ? proc_pid_lookup+0x460/0x460 [ 1205.936665] ? inode_security+0x107/0x140 [ 1205.937237] proc_root_readdir+0xa0/0xd0 [ 1205.937777] iterate_dir+0x584/0x710 [ 1205.938306] __x64_sys_getdents64+0x13a/0x2c0 [ 1205.938902] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1205.939499] ? fput_many+0x2f/0x1a0 [ 1205.939972] ? fillonedir+0x4b0/0x4b0 [ 1205.940485] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.941198] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1205.941877] do_syscall_64+0x33/0x40 [ 1205.942405] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1205.943076] RIP: 0033:0x7f66eeb7db19 [ 1205.943575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.946032] RSP: 002b:00007f66ec0f3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1205.947041] RAX: ffffffffffffffda RBX: 00007f66eec90f60 RCX: 00007f66eeb7db19 [ 1205.947972] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1205.948949] RBP: 00007f66ec0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1205.949879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1205.950856] R13: 00007ffd3dbcec4f R14: 00007f66ec0f3300 R15: 0000000000022000 [ 1205.951814] CPU: 1 PID: 7021 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1205.952733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1205.953810] Call Trace: [ 1205.954195] dump_stack+0x107/0x167 [ 1205.954662] should_fail.cold+0x5/0xa [ 1205.955149] ? security_inode_alloc+0x34/0x160 [ 1205.955734] should_failslab+0x5/0x20 [ 1205.956221] kmem_cache_alloc+0x5b/0x310 [ 1205.956766] security_inode_alloc+0x34/0x160 [ 1205.957356] inode_init_always+0xa4e/0xd10 [ 1205.957890] ? proc_free_inode+0x20/0x20 [ 1205.958451] alloc_inode+0x84/0x240 [ 1205.958914] new_inode+0x23/0x250 [ 1205.959360] proc_pid_make_inode+0x22/0x220 [ 1205.959910] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.960596] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1205.961358] proc_pid_instantiate+0x50/0x1e0 [ 1205.961916] proc_fill_cache+0x373/0x4a0 [ 1205.962477] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1205.963239] ? pid_update_inode+0xa0/0xa0 [ 1205.963765] ? pointer+0xa80/0xa80 [ 1205.964226] ? snprintf+0xbb/0x100 [ 1205.964811] proc_pid_readdir+0x3d3/0x830 [ 1205.965378] ? proc_pid_lookup+0x460/0x460 [ 1205.965912] ? inode_security+0x107/0x140 [ 1205.966456] proc_root_readdir+0xa0/0xd0 [ 1205.966975] iterate_dir+0x584/0x710 [ 1205.967454] __x64_sys_getdents64+0x13a/0x2c0 [ 1205.968026] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1205.968621] ? fput_many+0x2f/0x1a0 [ 1205.969087] ? fillonedir+0x4b0/0x4b0 [ 1205.969574] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.970283] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1205.970940] do_syscall_64+0x33/0x40 [ 1205.971414] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1205.972066] RIP: 0033:0x7f491c0d9b19 [ 1205.972591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.974990] RSP: 002b:00007f491964f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1205.975959] RAX: ffffffffffffffda RBX: 00007f491c1ecf60 RCX: 00007f491c0d9b19 [ 1205.976453] hpet: Lost 3 RTC interrupts [ 1205.976893] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000004 [ 1205.976910] RBP: 00007f491964f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1205.979280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1205.980189] R13: 00007ffca8d3deef R14: 00007f491964f300 R15: 0000000000022000 [ 1206.019088] FAULT_INJECTION: forcing a failure. [ 1206.019088] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.020995] CPU: 1 PID: 7030 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1206.021915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.023033] Call Trace: [ 1206.023465] dump_stack+0x107/0x167 [ 1206.023925] should_fail.cold+0x5/0xa [ 1206.024651] ? __d_alloc+0x2a/0x990 [ 1206.025115] should_failslab+0x5/0x20 [ 1206.025678] kmem_cache_alloc+0x5b/0x310 [ 1206.026250] ? mark_lock+0xf5/0x2df0 [ 1206.026745] __d_alloc+0x2a/0x990 [ 1206.027273] ? lock_acquire+0x197/0x470 [ 1206.027859] d_alloc_parallel+0x111/0x1bc0 [ 1206.028518] ? lock_downgrade+0x6d0/0x6d0 [ 1206.029050] ? find_held_lock+0x2c/0x110 [ 1206.029655] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1206.030179] ? __d_lookup+0x3bf/0x760 [ 1206.030785] ? lockdep_init_map_type+0x2c7/0x780 [ 1206.031390] ? lockdep_init_map_type+0x2c7/0x780 [ 1206.031995] proc_fill_cache+0x2f6/0x4a0 [ 1206.032529] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1206.033304] ? pid_update_inode+0xa0/0xa0 [ 1206.033829] ? pointer+0xa80/0xa80 [ 1206.034287] ? snprintf+0xbb/0x100 [ 1206.034755] proc_pid_readdir+0x3d3/0x830 [ 1206.035287] ? proc_pid_lookup+0x460/0x460 [ 1206.035824] ? inode_security+0x107/0x140 [ 1206.036357] proc_root_readdir+0xa0/0xd0 [ 1206.036890] iterate_dir+0x584/0x710 [ 1206.037369] __x64_sys_getdents64+0x13a/0x2c0 [ 1206.037939] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1206.038517] ? fput_many+0x2f/0x1a0 [ 1206.038978] ? fillonedir+0x4b0/0x4b0 [ 1206.039490] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1206.040176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1206.040869] do_syscall_64+0x33/0x40 [ 1206.041343] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.041992] RIP: 0033:0x7ff93dd2bb19 [ 1206.042468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.044950] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1206.045927] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1206.046835] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1206.047789] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.048758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1206.049670] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1206.063092] FAULT_INJECTION: forcing a failure. [ 1206.063092] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.064672] CPU: 1 PID: 7029 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1206.065548] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.066639] Call Trace: [ 1206.066978] dump_stack+0x107/0x167 [ 1206.067500] should_fail.cold+0x5/0xa [ 1206.067992] ? security_inode_alloc+0x34/0x160 [ 1206.068603] should_failslab+0x5/0x20 [ 1206.069094] kmem_cache_alloc+0x5b/0x310 [ 1206.069622] security_inode_alloc+0x34/0x160 [ 1206.070209] inode_init_always+0xa4e/0xd10 [ 1206.070758] ? proc_free_inode+0x20/0x20 [ 1206.071319] alloc_inode+0x84/0x240 [ 1206.071798] new_inode+0x23/0x250 [ 1206.072250] proc_pid_make_inode+0x22/0x220 [ 1206.072826] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1206.073568] proc_pid_instantiate+0x50/0x1e0 [ 1206.074160] proc_fill_cache+0x373/0x4a0 [ 1206.074766] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1206.075585] ? pid_update_inode+0xa0/0xa0 [ 1206.076116] ? pointer+0xa80/0xa80 [ 1206.076604] ? snprintf+0xbb/0x100 [ 1206.077080] proc_pid_readdir+0x3d3/0x830 [ 1206.077623] ? proc_pid_lookup+0x460/0x460 [ 1206.078170] ? dualshock4_get_calibration_data+0xbe3/0x1530 [ 1206.078906] ? inode_security+0x107/0x140 [ 1206.079489] proc_root_readdir+0xa0/0xd0 [ 1206.080014] iterate_dir+0x584/0x710 [ 1206.080515] __x64_sys_getdents64+0x13a/0x2c0 [ 1206.081097] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1206.081681] ? fput_many+0x2f/0x1a0 [ 1206.082166] ? fillonedir+0x4b0/0x4b0 [ 1206.082670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1206.083387] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1206.084051] do_syscall_64+0x33/0x40 [ 1206.084551] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.085209] RIP: 0033:0x7f85507e0b19 [ 1206.085689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.088120] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1206.089115] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1206.090155] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1206.091079] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1206.092037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1206.092969] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1206.096060] loop3: detected capacity change from 0 to 135266304 10:13:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 11) 10:13:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 11) 10:13:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 11) 10:13:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 7) 10:13:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:13:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420", 0xde, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 12) 10:14:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 8) 10:14:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 12) 10:14:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x4000) 10:14:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 12) [ 1219.718114] FAULT_INJECTION: forcing a failure. [ 1219.718114] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.719605] CPU: 0 PID: 7053 Comm: syz-executor.5 Not tainted 5.10.238 #1 10:14:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:06 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420", 0xde, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1219.720478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.721630] Call Trace: [ 1219.722004] dump_stack+0x107/0x167 [ 1219.722489] should_fail.cold+0x5/0xa [ 1219.722981] ? create_object.isra.0+0x3a/0xa20 [ 1219.723570] should_failslab+0x5/0x20 [ 1219.724059] kmem_cache_alloc+0x5b/0x310 [ 1219.724593] create_object.isra.0+0x3a/0xa20 [ 1219.725167] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1219.725822] kmem_cache_alloc+0x159/0x310 [ 1219.726358] security_inode_alloc+0x34/0x160 [ 1219.726925] inode_init_always+0xa4e/0xd10 [ 1219.727467] ? proc_free_inode+0x20/0x20 [ 1219.727991] alloc_inode+0x84/0x240 [ 1219.728264] FAULT_INJECTION: forcing a failure. [ 1219.728264] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.728457] new_inode+0x23/0x250 [ 1219.728474] proc_pid_make_inode+0x22/0x220 [ 1219.728489] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1219.732382] proc_pid_instantiate+0x50/0x1e0 [ 1219.732966] proc_fill_cache+0x373/0x4a0 [ 1219.733486] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1219.734255] ? pid_update_inode+0xa0/0xa0 [ 1219.734786] ? pointer+0xa80/0xa80 [ 1219.735251] ? snprintf+0xbb/0x100 [ 1219.735724] proc_pid_readdir+0x3d3/0x830 [ 1219.736262] ? proc_pid_lookup+0x460/0x460 [ 1219.736821] ? dualshock4_get_calibration_data+0xbe3/0x1530 [ 1219.737566] ? inode_security+0x107/0x140 [ 1219.738101] proc_root_readdir+0xa0/0xd0 [ 1219.738621] iterate_dir+0x584/0x710 [ 1219.739109] __x64_sys_getdents64+0x13a/0x2c0 [ 1219.739686] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1219.740268] ? fput_many+0x2f/0x1a0 [ 1219.740753] ? fillonedir+0x4b0/0x4b0 [ 1219.741255] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.741927] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.742604] do_syscall_64+0x33/0x40 [ 1219.743450] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.744418] RIP: 0033:0x7f85507e0b19 [ 1219.744973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.747389] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1219.748363] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1219.749350] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1219.750261] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.751173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1219.752086] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1219.757068] CPU: 1 PID: 7054 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1219.757183] hpet: Lost 1 RTC interrupts [ 1219.761426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.761434] Call Trace: [ 1219.766143] dump_stack+0x107/0x167 [ 1219.766610] should_fail.cold+0x5/0xa [ 1219.767098] ? create_object.isra.0+0x3a/0xa20 [ 1219.767682] should_failslab+0x5/0x20 [ 1219.768167] kmem_cache_alloc+0x5b/0x310 [ 1219.768714] create_object.isra.0+0x3a/0xa20 [ 1219.769279] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1219.769928] kmem_cache_alloc+0x159/0x310 [ 1219.770458] security_inode_alloc+0x34/0x160 [ 1219.771020] inode_init_always+0xa4e/0xd10 [ 1219.771553] ? proc_free_inode+0x20/0x20 [ 1219.772069] alloc_inode+0x84/0x240 [ 1219.772537] new_inode+0x23/0x250 [ 1219.773005] proc_pid_make_inode+0x22/0x220 [ 1219.773554] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.774221] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1219.774952] proc_pid_instantiate+0x50/0x1e0 [ 1219.775512] proc_fill_cache+0x373/0x4a0 [ 1219.776030] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1219.776851] ? pid_update_inode+0xa0/0xa0 [ 1219.777383] ? pointer+0xa80/0xa80 [ 1219.777845] ? snprintf+0xbb/0x100 [ 1219.778314] proc_pid_readdir+0x3d3/0x830 [ 1219.778849] ? proc_pid_lookup+0x460/0x460 [ 1219.779387] ? inode_security+0x107/0x140 [ 1219.779922] proc_root_readdir+0xa0/0xd0 [ 1219.780440] iterate_dir+0x584/0x710 [ 1219.780962] __x64_sys_getdents64+0x13a/0x2c0 [ 1219.781535] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1219.782115] ? fput_many+0x2f/0x1a0 [ 1219.782579] ? fillonedir+0x4b0/0x4b0 [ 1219.783071] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.783738] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.784395] do_syscall_64+0x33/0x40 [ 1219.784891] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.785541] RIP: 0033:0x7f66eeb7db19 [ 1219.786018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.788409] RSP: 002b:00007f66ec0f3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1219.789489] RAX: ffffffffffffffda RBX: 00007f66eec90f60 RCX: 00007f66eeb7db19 [ 1219.790393] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1219.791297] RBP: 00007f66ec0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.792201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1219.792774] hpet: Lost 1 RTC interrupts [ 1219.793228] R13: 00007ffd3dbcec4f R14: 00007f66ec0f3300 R15: 0000000000022000 [ 1219.801909] loop3: detected capacity change from 0 to 135266304 [ 1219.807015] FAULT_INJECTION: forcing a failure. [ 1219.807015] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.809153] CPU: 0 PID: 7056 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1219.810947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.813156] Call Trace: [ 1219.813835] dump_stack+0x107/0x167 [ 1219.814803] should_fail.cold+0x5/0xa [ 1219.815798] ? create_object.isra.0+0x3a/0xa20 [ 1219.816808] should_failslab+0x5/0x20 [ 1219.817297] kmem_cache_alloc+0x5b/0x310 [ 1219.817823] create_object.isra.0+0x3a/0xa20 [ 1219.818385] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1219.819039] kmem_cache_alloc+0x159/0x310 [ 1219.819570] ? mark_lock+0xf5/0x2df0 [ 1219.820053] __d_alloc+0x2a/0x990 [ 1219.820499] ? lock_acquire+0x197/0x470 [ 1219.821077] d_alloc_parallel+0x111/0x1bc0 [ 1219.821624] ? lock_downgrade+0x6d0/0x6d0 [ 1219.822155] ? find_held_lock+0x2c/0x110 [ 1219.822684] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1219.823212] ? __d_lookup+0x3bf/0x760 [ 1219.823705] ? lockdep_init_map_type+0x2c7/0x780 [ 1219.824312] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.825072] ? lockdep_init_map_type+0x2c7/0x780 [ 1219.825687] proc_fill_cache+0x2f6/0x4a0 [ 1219.826206] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1219.826972] ? pid_update_inode+0xa0/0xa0 [ 1219.827500] ? pointer+0xa80/0xa80 [ 1219.827963] ? snprintf+0xbb/0x100 [ 1219.828434] proc_pid_readdir+0x3d3/0x830 [ 1219.829017] ? proc_pid_lookup+0x460/0x460 [ 1219.829566] ? inode_security+0x107/0x140 [ 1219.830105] proc_root_readdir+0xa0/0xd0 [ 1219.830626] iterate_dir+0x584/0x710 [ 1219.831110] __x64_sys_getdents64+0x13a/0x2c0 [ 1219.831685] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1219.832266] ? fput_many+0x2f/0x1a0 [ 1219.832749] ? fillonedir+0x4b0/0x4b0 [ 1219.833243] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.833913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.834574] do_syscall_64+0x33/0x40 [ 1219.835051] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.835705] RIP: 0033:0x7ff93dd2bb19 [ 1219.836181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.840659] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1219.841636] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1219.842550] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1219.843462] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.844373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1219.845346] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1219.846444] hpet: Lost 1 RTC interrupts 10:14:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1219.888784] FAULT_INJECTION: forcing a failure. [ 1219.888784] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.891732] CPU: 0 PID: 7045 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1219.893529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.895697] Call Trace: [ 1219.896362] dump_stack+0x107/0x167 [ 1219.897404] should_fail.cold+0x5/0xa [ 1219.898360] ? create_object.isra.0+0x3a/0xa20 [ 1219.899507] should_failslab+0x5/0x20 [ 1219.900459] kmem_cache_alloc+0x5b/0x310 [ 1219.901072] create_object.isra.0+0x3a/0xa20 [ 1219.901636] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1219.902295] kmem_cache_alloc+0x159/0x310 [ 1219.902857] security_inode_alloc+0x34/0x160 [ 1219.903424] inode_init_always+0xa4e/0xd10 [ 1219.903967] ? proc_free_inode+0x20/0x20 [ 1219.904490] alloc_inode+0x84/0x240 [ 1219.905553] new_inode+0x23/0x250 [ 1219.906656] proc_pid_make_inode+0x22/0x220 [ 1219.908006] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1219.909644] proc_pid_instantiate+0x50/0x1e0 [ 1219.910785] proc_fill_cache+0x373/0x4a0 [ 1219.911854] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1219.913493] ? pid_update_inode+0xa0/0xa0 [ 1219.914570] ? pointer+0xa80/0xa80 [ 1219.915499] ? snprintf+0xbb/0x100 [ 1219.916413] proc_pid_readdir+0x3d3/0x830 [ 1219.917544] ? proc_pid_lookup+0x460/0x460 [ 1219.918642] ? inode_security+0x107/0x140 [ 1219.919721] proc_root_readdir+0xa0/0xd0 [ 1219.920791] iterate_dir+0x584/0x710 [ 1219.921728] __x64_sys_getdents64+0x13a/0x2c0 [ 1219.922853] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1219.923995] ? fput_many+0x2f/0x1a0 [ 1219.925017] ? fillonedir+0x4b0/0x4b0 [ 1219.925952] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.927239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.928503] do_syscall_64+0x33/0x40 [ 1219.929069] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.929725] RIP: 0033:0x7f491c0d9b19 [ 1219.930202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.932552] RSP: 002b:00007f491964f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1219.934599] RAX: ffffffffffffffda RBX: 00007f491c1ecf60 RCX: 00007f491c0d9b19 [ 1219.936478] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000004 [ 1219.937504] RBP: 00007f491964f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.938413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1219.939323] R13: 00007ffca8d3deef R14: 00007f491964f300 R15: 0000000000022000 [ 1219.940435] hpet: Lost 2 RTC interrupts 10:14:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 13) 10:14:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 13) 10:14:06 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420", 0xde, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 9) 10:14:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x26) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1220.031208] FAULT_INJECTION: forcing a failure. [ 1220.031208] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1220.034257] CPU: 0 PID: 7074 Comm: syz-executor.2 Not tainted 5.10.238 #1 [ 1220.036058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.037844] Call Trace: [ 1220.038528] dump_stack+0x107/0x167 [ 1220.039447] should_fail.cold+0x5/0xa [ 1220.040426] _copy_to_user+0x2e/0x180 [ 1220.041586] simple_read_from_buffer+0xcc/0x160 [ 1220.042767] proc_fail_nth_read+0x198/0x230 [ 1220.043882] ? proc_sessionid_read+0x230/0x230 [ 1220.045130] ? security_file_permission+0xb1/0xe0 [ 1220.046422] ? proc_sessionid_read+0x230/0x230 [ 1220.047616] vfs_read+0x228/0x620 [ 1220.048597] ksys_read+0x12d/0x260 [ 1220.049547] ? vfs_write+0xb10/0xb10 [ 1220.050539] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1220.051910] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1220.053312] do_syscall_64+0x33/0x40 [ 1220.054309] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.055658] RIP: 0033:0x7f66eeb3069c [ 1220.056617] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1220.061627] RSP: 002b:00007f66ec0f3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1220.063678] RAX: ffffffffffffffda RBX: 0000000000000798 RCX: 00007f66eeb3069c [ 1220.065658] RDX: 000000000000000f RSI: 00007f66ec0f31e0 RDI: 0000000000000006 [ 1220.067549] RBP: 00007f66ec0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.069479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1220.071385] R13: 00007ffd3dbcec4f R14: 00007f66ec0f3300 R15: 0000000000022000 [ 1220.073530] hpet: Lost 1 RTC interrupts 10:14:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, 0x0, &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1220.076341] FAULT_INJECTION: forcing a failure. [ 1220.076341] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.082322] CPU: 1 PID: 7078 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1220.083361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.084670] Call Trace: [ 1220.085414] dump_stack+0x107/0x167 [ 1220.086449] should_fail.cold+0x5/0xa [ 1220.087536] ? __d_alloc+0x2a/0x990 [ 1220.088558] should_failslab+0x5/0x20 [ 1220.089659] kmem_cache_alloc+0x5b/0x310 [ 1220.090848] ? mark_lock+0xf5/0x2df0 [ 1220.091905] __d_alloc+0x2a/0x990 [ 1220.092956] ? lock_acquire+0x197/0x470 [ 1220.094243] d_alloc_parallel+0x111/0x1bc0 [ 1220.095631] ? lock_downgrade+0x6d0/0x6d0 [ 1220.096775] ? find_held_lock+0x2c/0x110 [ 1220.097304] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1220.097832] ? __d_lookup+0x3bf/0x760 [ 1220.098324] ? lockdep_init_map_type+0x2c7/0x780 [ 1220.098929] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1220.099625] ? lockdep_init_map_type+0x2c7/0x780 [ 1220.100239] proc_fill_cache+0x2f6/0x4a0 [ 1220.101044] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1220.103027] ? pid_update_inode+0xa0/0xa0 [ 1220.104370] ? pointer+0xa80/0xa80 [ 1220.105435] ? snprintf+0xbb/0x100 [ 1220.106519] proc_pid_readdir+0x3d3/0x830 [ 1220.107700] ? proc_pid_lookup+0x460/0x460 [ 1220.108925] ? inode_security+0x107/0x140 [ 1220.110118] proc_root_readdir+0xa0/0xd0 [ 1220.111277] iterate_dir+0x584/0x710 [ 1220.112324] __x64_sys_getdents64+0x13a/0x2c0 [ 1220.113072] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1220.113660] ? fput_many+0x2f/0x1a0 [ 1220.114128] ? fillonedir+0x4b0/0x4b0 [ 1220.114622] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1220.115294] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1220.115957] do_syscall_64+0x33/0x40 [ 1220.116434] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.117161] RIP: 0033:0x7f85507e0b19 [ 1220.117635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.119987] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1220.121043] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1220.121975] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1220.122889] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.123799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1220.124764] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1220.128612] hpet: Lost 1 RTC interrupts [ 1220.137866] loop3: detected capacity change from 0 to 135266304 [ 1220.146048] FAULT_INJECTION: forcing a failure. [ 1220.146048] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.149271] CPU: 1 PID: 7080 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1220.151141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.153391] Call Trace: [ 1220.154099] dump_stack+0x107/0x167 [ 1220.155036] should_fail.cold+0x5/0xa [ 1220.156012] ? proc_alloc_inode+0x18/0x200 [ 1220.157195] should_failslab+0x5/0x20 [ 1220.158186] kmem_cache_alloc+0x5b/0x310 [ 1220.159248] ? proc_free_inode+0x20/0x20 [ 1220.160294] proc_alloc_inode+0x18/0x200 [ 1220.161389] ? proc_free_inode+0x20/0x20 [ 1220.162441] alloc_inode+0x63/0x240 [ 1220.163387] new_inode+0x23/0x250 [ 1220.164276] proc_pid_make_inode+0x22/0x220 [ 1220.165011] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1220.165682] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1220.166416] proc_pid_instantiate+0x50/0x1e0 [ 1220.166980] proc_fill_cache+0x373/0x4a0 [ 1220.167498] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1220.168294] ? pid_update_inode+0xa0/0xa0 [ 1220.168893] ? pointer+0xa80/0xa80 [ 1220.169358] ? snprintf+0xbb/0x100 [ 1220.169830] proc_pid_readdir+0x3d3/0x830 [ 1220.170368] ? proc_pid_lookup+0x460/0x460 [ 1220.170911] ? inode_security+0x107/0x140 [ 1220.171450] proc_root_readdir+0xa0/0xd0 [ 1220.171973] iterate_dir+0x584/0x710 [ 1220.172456] __x64_sys_getdents64+0x13a/0x2c0 [ 1220.173131] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1220.173709] ? fput_many+0x2f/0x1a0 [ 1220.174218] ? fillonedir+0x4b0/0x4b0 [ 1220.174714] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1220.175386] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1220.176048] do_syscall_64+0x33/0x40 [ 1220.176527] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.177919] RIP: 0033:0x7ff93dd2bb19 [ 1220.178925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.183867] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1220.185908] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1220.187779] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1220.189128] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.190042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1220.190955] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1220.196621] hpet: Lost 1 RTC interrupts 10:14:07 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c2259", 0xe2, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 13) 10:14:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:07 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000140)='wg0\x00') openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:14:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1220.289339] FAULT_INJECTION: forcing a failure. [ 1220.289339] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1220.292823] CPU: 1 PID: 7090 Comm: syz-executor.1 Not tainted 5.10.238 #1 [ 1220.294539] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.296609] Call Trace: [ 1220.296984] dump_stack+0x107/0x167 [ 1220.297456] should_fail.cold+0x5/0xa [ 1220.297949] _copy_to_user+0x2e/0x180 [ 1220.298445] simple_read_from_buffer+0xcc/0x160 [ 1220.299048] proc_fail_nth_read+0x198/0x230 [ 1220.299606] ? proc_sessionid_read+0x230/0x230 [ 1220.300193] ? security_file_permission+0xb1/0xe0 [ 1220.300837] ? proc_sessionid_read+0x230/0x230 [ 1220.301427] vfs_read+0x228/0x620 [ 1220.301882] ksys_read+0x12d/0x260 [ 1220.302363] ? vfs_write+0xb10/0xb10 [ 1220.302844] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1220.303518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1220.304180] do_syscall_64+0x33/0x40 [ 1220.304670] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1220.305376] RIP: 0033:0x7f491c08c69c [ 1220.305856] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1220.308215] RSP: 002b:00007f491964f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1220.309256] RAX: ffffffffffffffda RBX: 0000000000000798 RCX: 00007f491c08c69c [ 1220.310172] RDX: 000000000000000f RSI: 00007f491964f1e0 RDI: 0000000000000005 [ 1220.311083] RBP: 00007f491964f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1220.311996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1220.312930] R13: 00007ffca8d3deef R14: 00007f491964f300 R15: 0000000000022000 10:14:07 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c2259", 0xe2, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 14) 10:14:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c2259", 0xe2, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x18) 10:14:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x39}}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 10) [ 1234.029849] loop3: detected capacity change from 0 to 135266304 [ 1234.039247] FAULT_INJECTION: forcing a failure. [ 1234.039247] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.040792] CPU: 0 PID: 7118 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1234.041707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.042791] Call Trace: [ 1234.043158] dump_stack+0x107/0x167 [ 1234.043656] should_fail.cold+0x5/0xa [ 1234.044205] ? create_object.isra.0+0x3a/0xa20 [ 1234.048813] should_failslab+0x5/0x20 [ 1234.049352] kmem_cache_alloc+0x5b/0x310 [ 1234.049882] create_object.isra.0+0x3a/0xa20 [ 1234.050449] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1234.051109] kmem_cache_alloc+0x159/0x310 [ 1234.051649] ? mark_lock+0xf5/0x2df0 [ 1234.052139] __d_alloc+0x2a/0x990 [ 1234.052588] ? lock_acquire+0x197/0x470 [ 1234.053129] d_alloc_parallel+0x111/0x1bc0 [ 1234.053681] ? lock_downgrade+0x6d0/0x6d0 [ 1234.054217] ? find_held_lock+0x2c/0x110 [ 1234.054748] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1234.055283] ? __d_lookup+0x3bf/0x760 [ 1234.055779] ? lockdep_init_map_type+0x2c7/0x780 [ 1234.056421] ? lockdep_init_map_type+0x2c7/0x780 [ 1234.057092] proc_fill_cache+0x2f6/0x4a0 [ 1234.057617] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1234.058389] ? pid_update_inode+0xa0/0xa0 [ 1234.058922] ? pointer+0xa80/0xa80 [ 1234.059390] ? snprintf+0xbb/0x100 [ 1234.059881] proc_pid_readdir+0x3d3/0x830 [ 1234.060436] ? proc_pid_lookup+0x460/0x460 [ 1234.061016] ? inode_security+0x107/0x140 [ 1234.061576] proc_root_readdir+0xa0/0xd0 [ 1234.062097] iterate_dir+0x584/0x710 [ 1234.062582] __x64_sys_getdents64+0x13a/0x2c0 [ 1234.063160] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1234.063741] ? fput_many+0x2f/0x1a0 [ 1234.064213] ? fillonedir+0x4b0/0x4b0 [ 1234.064710] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1234.065400] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1234.066065] do_syscall_64+0x33/0x40 [ 1234.066554] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.067212] RIP: 0033:0x7f85507e0b19 [ 1234.067687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.074068] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1234.075079] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1234.076009] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1234.076964] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.077877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.078789] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1234.079885] hpet: Lost 2 RTC interrupts [ 1234.153474] hpet: Lost 4 RTC interrupts [ 1234.163898] FAULT_INJECTION: forcing a failure. [ 1234.163898] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.165634] CPU: 0 PID: 7113 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1234.166510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.167568] Call Trace: [ 1234.167909] dump_stack+0x107/0x167 [ 1234.168410] should_fail.cold+0x5/0xa [ 1234.168916] ? create_object.isra.0+0x3a/0xa20 [ 1234.169545] should_failslab+0x5/0x20 [ 1234.170034] kmem_cache_alloc+0x5b/0x310 [ 1234.170559] create_object.isra.0+0x3a/0xa20 [ 1234.171119] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1234.171777] kmem_cache_alloc+0x159/0x310 [ 1234.172343] ? proc_free_inode+0x20/0x20 [ 1234.176881] proc_alloc_inode+0x18/0x200 [ 1234.177401] ? proc_free_inode+0x20/0x20 [ 1234.177921] alloc_inode+0x63/0x240 [ 1234.178389] new_inode+0x23/0x250 [ 1234.178839] proc_pid_make_inode+0x22/0x220 [ 1234.179423] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1234.180157] proc_pid_instantiate+0x50/0x1e0 [ 1234.180731] proc_fill_cache+0x373/0x4a0 [ 1234.181271] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1234.182040] ? pid_update_inode+0xa0/0xa0 [ 1234.182578] ? pointer+0xa80/0xa80 [ 1234.183048] ? snprintf+0xbb/0x100 [ 1234.183549] proc_pid_readdir+0x3d3/0x830 [ 1234.184083] ? proc_pid_lookup+0x460/0x460 [ 1234.184674] ? inode_security+0x107/0x140 [ 1234.185230] proc_root_readdir+0xa0/0xd0 [ 1234.185754] iterate_dir+0x584/0x710 [ 1234.186270] __x64_sys_getdents64+0x13a/0x2c0 [ 1234.186847] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1234.187474] ? fput_many+0x2f/0x1a0 [ 1234.187970] ? fillonedir+0x4b0/0x4b0 [ 1234.188499] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1234.189227] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1234.189912] do_syscall_64+0x33/0x40 [ 1234.190417] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.191067] RIP: 0033:0x7ff93dd2bb19 [ 1234.191593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.193996] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1234.194989] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1234.195949] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1234.200887] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.201797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.202715] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1234.203783] hpet: Lost 2 RTC interrupts 10:14:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1002) 10:14:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1003) 10:14:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 15) 10:14:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x18) [ 1234.351958] FAULT_INJECTION: forcing a failure. [ 1234.351958] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.353867] CPU: 1 PID: 7141 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1234.354768] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1234.355863] Call Trace: [ 1234.356206] dump_stack+0x107/0x167 [ 1234.356674] should_fail.cold+0x5/0xa [ 1234.357192] ? proc_alloc_inode+0x18/0x200 [ 1234.357779] should_failslab+0x5/0x20 [ 1234.358267] kmem_cache_alloc+0x5b/0x310 [ 1234.358844] ? proc_free_inode+0x20/0x20 [ 1234.359366] proc_alloc_inode+0x18/0x200 [ 1234.359893] ? proc_free_inode+0x20/0x20 [ 1234.360413] alloc_inode+0x63/0x240 [ 1234.360950] new_inode+0x23/0x250 [ 1234.361410] proc_pid_make_inode+0x22/0x220 [ 1234.361996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1234.362722] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1234.363462] proc_pid_instantiate+0x50/0x1e0 [ 1234.364035] proc_fill_cache+0x373/0x4a0 [ 1234.364562] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1234.365348] ? pid_update_inode+0xa0/0xa0 [ 1234.365918] ? pointer+0xa80/0xa80 [ 1234.366380] ? snprintf+0xbb/0x100 [ 1234.366899] proc_pid_readdir+0x3d3/0x830 [ 1234.367438] ? proc_pid_lookup+0x460/0x460 [ 1234.367990] ? inode_security+0x107/0x140 [ 1234.368564] proc_root_readdir+0xa0/0xd0 [ 1234.369100] iterate_dir+0x584/0x710 [ 1234.369615] __x64_sys_getdents64+0x13a/0x2c0 [ 1234.370210] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1234.370804] ? fput_many+0x2f/0x1a0 [ 1234.371281] ? fillonedir+0x4b0/0x4b0 [ 1234.371823] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1234.372538] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1234.373213] do_syscall_64+0x33/0x40 [ 1234.373738] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1234.374395] RIP: 0033:0x7f85507e0b19 [ 1234.374873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.377296] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1234.378277] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1234.379193] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1234.380134] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1234.381107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1234.382023] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1242.556958] hpet: Lost 1 RTC interrupts 10:14:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fec", 0xe4, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 16) 10:14:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 11) [ 1248.378604] loop3: detected capacity change from 0 to 135266304 [ 1248.383915] FAULT_INJECTION: forcing a failure. [ 1248.383915] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.385770] CPU: 1 PID: 7149 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1248.386670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1248.393480] Call Trace: [ 1248.393841] dump_stack+0x107/0x167 [ 1248.394345] should_fail.cold+0x5/0xa [ 1248.394846] ? create_object.isra.0+0x3a/0xa20 [ 1248.395494] should_failslab+0x5/0x20 [ 1248.395994] kmem_cache_alloc+0x5b/0x310 [ 1248.396533] create_object.isra.0+0x3a/0xa20 [ 1248.397133] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1248.397805] kmem_cache_alloc+0x159/0x310 [ 1248.398385] ? proc_free_inode+0x20/0x20 [ 1248.398912] proc_alloc_inode+0x18/0x200 [ 1248.399450] ? proc_free_inode+0x20/0x20 [ 1248.399980] alloc_inode+0x63/0x240 [ 1248.400451] new_inode+0x23/0x250 [ 1248.400931] proc_pid_make_inode+0x22/0x220 [ 1248.401519] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 10:14:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x2, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_io_uring_setup(0x544d, &(0x7f0000001cc0)={0x0, 0x402a, 0x20, 0x2, 0x2a5, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001d40)=0x0, &(0x7f0000007e00)) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000009500)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000008400)={0x0, 0x0, "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", "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"}) r5 = syz_io_uring_setup(0x3fc7, &(0x7f0000009400)={0x0, 0x93db, 0x10, 0x1, 0x399, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000009480), &(0x7f00000094c0)) r6 = syz_io_uring_setup(0x7df4, &(0x7f00000002c0)={0x0, 0xeabd, 0x1, 0x0, 0x7ffffffc, 0x0, r5}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000008380)=@IORING_OP_SENDMSG={0x9, 0x5, 0x0, r0, 0x0, &(0x7f0000008340)={&(0x7f0000007e40)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x6}, 0x80, &(0x7f00000081c0)=[{&(0x7f0000007ec0)="c3fec1e29e7cb6f73ad6add618e456790694d7cb51e2384a723f8afd33205237038c8faa173a9557faf17cff71e8614659df6a02af37c8e739d6b8acfb7f572afc4c54392781d870525037829649e0008b50bdae34acd9312367041711092565c75005fa0792e7a818de4477b91b39c6bc7af10757c1818eed246741e76a15b10980ec3dd460165755fee1968f3aa5d79208549119b4276bece286e2cfeff58b", 0xa0}, {&(0x7f0000007f80)="5358e0aad9996d9a0f14f0183f213a0f7c98695db37994ea2e3a429e5e64b3246b545417706aa1b096f707afe94a9e7816a18c97a9c2006c8ab7d1ca4a64d81dc462d67af7a182a2acaea7b9c6125d76a16521e263db", 0x56}, {&(0x7f0000008000)="ba1e60c1b31e96e0d40b326c82a8892e42f1f615aa3dbf5f4a00df66f327ae3071d02dd4aa98c795c6b2cbfe890b236de993e07bde6cf01dbf6edc569d49afe623ab303f4b08ce43a613a0b65e02023b88588d4bd337f3d0de72bc27303997ed8147a7c2a4a99d19ce45741eee", 0x6d}, {&(0x7f0000008080)="9ed9d1c59ec70781feef94b3788ae510f138f35604357905ecaea7910ca50b50613328cac6167807809add043fc3ef15b1a078254d3cd1023e212445fe4e3cf6048ee5178b39ea7c80602d257512510c91c5", 0x52}, {&(0x7f0000008100)="d52cce26167644e97dad6f838e73744dc865c6bc1d2c02c787121eff2c1ccb32f1c25027627799952920ffd3497522b47cf74397b92dd398caae39a25a322a31a944779268edfe6bab6644a7c8a80c5a84a13df23ab9b3efd2d22abeb2b6838b249ead281e361052d10dfd2c26c7ffcda7ef0f3585fe7310641bc1ebcd5d2e5ed2a0f82c9d534ba061eaca4664da29404f34e330fb7407e21fe7a5a2f5f9504a9519914c946af7", 0xa7}], 0x5, &(0x7f0000008240)=[{0xa0, 0x104, 0x0, "e65e7959af73f110d4512d721fbb94478fa4f58a57f8527f4d366f38293db595e067c45207d0b85d25171a509f88590b30557745855e91a103750aeb06af175247ad03654dff2af4ad689134f20e67094504b9890a27ca8bacd498dc8490a7a5636951be95da983f7cf53a053a27d3748101a91ea158a403aed48783dc044fcd647b1b0bf0eec9d476560acf502341"}, {0x38, 0x121, 0x3, "0dc07ef0f69209ab2454a069ca316e9c0022033b403ac0c8f911be5cc4cff6712cd7ea6c51e6"}], 0xd8}, 0x0, 0x800, 0x1, {0x0, r7}}, 0x7) clock_gettime(0x0, &(0x7f0000001bc0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001b00)=[{{&(0x7f00000001c0)=@nl, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/83, 0x53}, {&(0x7f00000002c0)=""/181, 0xb5}, {&(0x7f0000000380)=""/22, 0x16}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4096, 0x1000}], 0x5, &(0x7f0000003e00)=""/4096, 0x1000}, 0xfffffc00}, {{&(0x7f0000000440)=@ethernet={0x0, @local}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000004c0)=""/67, 0x43}, {&(0x7f0000000540)=""/166, 0xa6}, {&(0x7f0000004e00)=""/4096, 0x1000}, {&(0x7f0000000600)}, {&(0x7f0000005e00)=""/4096, 0x1000}, {&(0x7f0000000640)=""/201, 0xc9}, {&(0x7f0000000740)=""/100, 0x64}], 0x7, &(0x7f0000001880)=""/81, 0x51}, 0x2}, {{&(0x7f0000001900)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000001980)=""/160, 0xa0}], 0x1, &(0x7f0000001a40)=""/160, 0xa0}}], 0x3, 0x4002a041, &(0x7f0000001c00)={r8, r9+60000000}) r11 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r11, &(0x7f0000000880)=""/4096, 0x1000) [ 1248.402209] proc_pid_make_base_inode.constprop.0+0x25/0x180 syz_io_uring_submit(0x0, 0x0, &(0x7f0000001c80)=@IORING_OP_WRITEV={0x2, 0x5, 0x2004, @fd=r10, 0x8000, &(0x7f0000001c40)=[{&(0x7f0000000600)="0dc5df0cae9042f45d61894a4affea76", 0x10}, {&(0x7f0000006e00)="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", 0x1000}], 0x2, 0x11, 0x1, {0x3}}, 0x800) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@v1={0x1000000, [{0x271, 0x3}]}, 0xc, 0x0) 10:14:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1004) 10:14:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1002) [ 1248.409066] proc_pid_instantiate+0x50/0x1e0 [ 1248.413555] proc_fill_cache+0x373/0x4a0 [ 1248.414091] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1248.414893] ? pid_update_inode+0xa0/0xa0 [ 1248.415467] ? pointer+0xa80/0xa80 [ 1248.415952] ? snprintf+0xbb/0x100 [ 1248.416488] proc_pid_readdir+0x3d3/0x830 [ 1248.417067] ? proc_pid_lookup+0x460/0x460 [ 1248.417634] ? inode_security+0x107/0x140 [ 1248.418388] proc_root_readdir+0xa0/0xd0 [ 1248.425385] iterate_dir+0x584/0x710 [ 1248.425896] __x64_sys_getdents64+0x13a/0x2c0 [ 1248.426519] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1248.427157] ? fput_many+0x2f/0x1a0 [ 1248.427646] ? fillonedir+0x4b0/0x4b0 [ 1248.428161] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1248.428858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1248.429567] do_syscall_64+0x33/0x40 [ 1248.430061] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1248.430729] RIP: 0033:0x7f85507e0b19 [ 1248.431269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1248.433684] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1248.449562] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1248.450465] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1248.451397] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1248.452291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1248.453206] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 10:14:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1248.529759] hpet: Lost 4 RTC interrupts 10:14:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 17) [ 1248.573123] hpet: Lost 1 RTC interrupts [ 1248.575948] FAULT_INJECTION: forcing a failure. [ 1248.575948] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.577603] CPU: 0 PID: 7155 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1248.578472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1248.579525] Call Trace: [ 1248.579868] dump_stack+0x107/0x167 [ 1248.580334] should_fail.cold+0x5/0xa [ 1248.580821] ? security_inode_alloc+0x34/0x160 [ 1248.593441] should_failslab+0x5/0x20 [ 1248.593927] kmem_cache_alloc+0x5b/0x310 [ 1248.594476] security_inode_alloc+0x34/0x160 [ 1248.595032] inode_init_always+0xa4e/0xd10 [ 1248.595612] ? proc_free_inode+0x20/0x20 [ 1248.596129] alloc_inode+0x84/0x240 [ 1248.596589] new_inode+0x23/0x250 [ 1248.597083] proc_pid_make_inode+0x22/0x220 [ 1248.597631] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1248.598362] proc_pid_instantiate+0x50/0x1e0 [ 1248.598916] proc_fill_cache+0x373/0x4a0 [ 1248.599464] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1248.600231] ? pid_update_inode+0xa0/0xa0 [ 1248.600754] ? pointer+0xa80/0xa80 [ 1248.601229] ? snprintf+0xbb/0x100 [ 1248.601696] proc_pid_readdir+0x3d3/0x830 [ 1248.602232] ? proc_pid_lookup+0x460/0x460 [ 1248.602793] ? inode_security+0x107/0x140 [ 1248.603323] proc_root_readdir+0xa0/0xd0 [ 1248.603877] iterate_dir+0x584/0x710 [ 1248.604354] __x64_sys_getdents64+0x13a/0x2c0 [ 1248.604933] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1248.605519] ? fput_many+0x2f/0x1a0 [ 1248.605978] ? fillonedir+0x4b0/0x4b0 [ 1248.606500] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1248.607172] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1248.607829] do_syscall_64+0x33/0x40 [ 1248.608303] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1248.608977] RIP: 0033:0x7ff93dd2bb19 [ 1248.609466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1248.612470] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1248.613429] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1248.614280] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1248.615145] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1248.616003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1248.616862] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1248.617931] hpet: Lost 1 RTC interrupts 10:14:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fec", 0xe4, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1007) 10:14:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 12) [ 1248.740593] FAULT_INJECTION: forcing a failure. [ 1248.740593] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.742424] CPU: 1 PID: 7172 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1248.743317] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1248.744424] Call Trace: [ 1248.744819] dump_stack+0x107/0x167 [ 1248.745325] should_fail.cold+0x5/0xa [ 1248.745834] ? security_inode_alloc+0x34/0x160 [ 1248.746440] should_failslab+0x5/0x20 [ 1248.753274] kmem_cache_alloc+0x5b/0x310 [ 1248.753827] security_inode_alloc+0x34/0x160 [ 1248.754412] inode_init_always+0xa4e/0xd10 [ 1248.755004] ? proc_free_inode+0x20/0x20 [ 1248.755542] alloc_inode+0x84/0x240 [ 1248.756069] new_inode+0x23/0x250 [ 1248.756538] proc_pid_make_inode+0x22/0x220 [ 1248.757126] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1248.757888] proc_pid_instantiate+0x50/0x1e0 [ 1248.758476] proc_fill_cache+0x373/0x4a0 [ 1248.759044] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1248.759873] ? pid_update_inode+0xa0/0xa0 [ 1248.760412] ? pointer+0xa80/0xa80 [ 1248.760890] ? snprintf+0xbb/0x100 [ 1248.761397] proc_pid_readdir+0x3d3/0x830 [ 1248.761949] ? proc_pid_lookup+0x460/0x460 [ 1248.769204] ? inode_security+0x107/0x140 [ 1248.769795] proc_root_readdir+0xa0/0xd0 [ 1248.770335] iterate_dir+0x584/0x710 [ 1248.770880] __x64_sys_getdents64+0x13a/0x2c0 [ 1248.771478] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1248.772078] ? fput_many+0x2f/0x1a0 [ 1248.772557] ? fillonedir+0x4b0/0x4b0 [ 1248.773089] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1248.773809] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1248.774484] do_syscall_64+0x33/0x40 [ 1248.775020] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1248.775692] RIP: 0033:0x7f85507e0b19 [ 1248.776188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1248.778738] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1248.779751] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1248.780719] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1248.781667] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1248.782627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1248.783562] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 [ 1248.810211] FAULT_INJECTION: forcing a failure. [ 1248.810211] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.811882] CPU: 1 PID: 7179 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1248.812770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1248.813865] Call Trace: [ 1248.814221] dump_stack+0x107/0x167 [ 1248.814730] should_fail.cold+0x5/0xa [ 1248.815235] ? create_object.isra.0+0x3a/0xa20 [ 1248.815869] should_failslab+0x5/0x20 [ 1248.816383] kmem_cache_alloc+0x5b/0x310 [ 1248.816934] create_object.isra.0+0x3a/0xa20 [ 1248.817523] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1248.818227] kmem_cache_alloc+0x159/0x310 [ 1248.818799] security_inode_alloc+0x34/0x160 [ 1248.819409] inode_init_always+0xa4e/0xd10 [ 1248.819971] ? proc_free_inode+0x20/0x20 [ 1248.820514] alloc_inode+0x84/0x240 [ 1248.821013] new_inode+0x23/0x250 [ 1248.821482] proc_pid_make_inode+0x22/0x220 [ 1248.822092] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1248.822883] proc_pid_instantiate+0x50/0x1e0 [ 1248.823478] proc_fill_cache+0x373/0x4a0 [ 1248.824018] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1248.824861] ? pid_update_inode+0xa0/0xa0 [ 1248.825421] ? pointer+0xa80/0xa80 [ 1248.825931] ? snprintf+0xbb/0x100 [ 1248.826422] proc_pid_readdir+0x3d3/0x830 [ 1248.827021] ? proc_pid_lookup+0x460/0x460 [ 1248.827574] ? inode_security+0x107/0x140 [ 1248.828082] proc_root_readdir+0xa0/0xd0 [ 1248.828613] iterate_dir+0x584/0x710 [ 1248.829126] __x64_sys_getdents64+0x13a/0x2c0 [ 1248.829743] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1248.830353] ? fput_many+0x2f/0x1a0 [ 1248.830863] ? fillonedir+0x4b0/0x4b0 [ 1248.831394] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1248.832089] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1248.832810] do_syscall_64+0x33/0x40 [ 1248.833323] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1248.834045] RIP: 0033:0x7ff93dd2bb19 [ 1248.834531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1248.836973] RSP: 002b:00007ff93b2a1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1248.838013] RAX: ffffffffffffffda RBX: 00007ff93de3ef60 RCX: 00007ff93dd2bb19 [ 1248.838945] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1248.839874] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1248.840901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1248.841854] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 [ 1248.868798] loop3: detected capacity change from 0 to 135266304 10:14:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x53) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1003) 10:14:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 13) 10:14:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fec", 0xe4, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1048) 10:14:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 18) 10:14:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1262.872627] loop3: detected capacity change from 0 to 135266304 [ 1262.879070] FAULT_INJECTION: forcing a failure. [ 1262.879070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1262.880801] CPU: 1 PID: 7194 Comm: syz-executor.4 Not tainted 5.10.238 #1 [ 1262.881699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1262.882789] Call Trace: [ 1262.883131] dump_stack+0x107/0x167 [ 1262.883648] should_fail.cold+0x5/0xa [ 1262.884147] _copy_to_user+0x2e/0x180 [ 1262.884646] simple_read_from_buffer+0xcc/0x160 [ 1262.885264] proc_fail_nth_read+0x198/0x230 [ 1262.885823] ? proc_sessionid_read+0x230/0x230 [ 1262.886414] ? security_file_permission+0xb1/0xe0 [ 1262.887040] ? proc_sessionid_read+0x230/0x230 [ 1262.893363] vfs_read+0x228/0x620 [ 1262.893817] ksys_read+0x12d/0x260 [ 1262.894272] ? vfs_write+0xb10/0xb10 [ 1262.894759] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1262.895431] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1262.896093] do_syscall_64+0x33/0x40 [ 1262.896604] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1262.901605] RIP: 0033:0x7ff93dcde69c [ 1262.902099] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1262.904444] RSP: 002b:00007ff93b2a1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1262.909437] RAX: ffffffffffffffda RBX: 0000000000000798 RCX: 00007ff93dcde69c [ 1262.910393] RDX: 000000000000000f RSI: 00007ff93b2a11e0 RDI: 0000000000000006 [ 1262.911335] RBP: 00007ff93b2a11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1262.912283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1262.917239] R13: 00007ffff0f6c90f R14: 00007ff93b2a1300 R15: 0000000000022000 10:14:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1262.997951] hpet: Lost 4 RTC interrupts [ 1263.002736] FAULT_INJECTION: forcing a failure. [ 1263.002736] name failslab, interval 1, probability 0, space 0, times 0 [ 1263.004655] CPU: 1 PID: 7201 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1263.005594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1263.006684] Call Trace: [ 1263.007040] dump_stack+0x107/0x167 [ 1263.007538] should_fail.cold+0x5/0xa [ 1263.008052] ? create_object.isra.0+0x3a/0xa20 [ 1263.008675] should_failslab+0x5/0x20 [ 1263.009190] kmem_cache_alloc+0x5b/0x310 [ 1263.009755] create_object.isra.0+0x3a/0xa20 [ 1263.010317] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1263.010973] kmem_cache_alloc+0x159/0x310 [ 1263.011509] security_inode_alloc+0x34/0x160 [ 1263.012078] inode_init_always+0xa4e/0xd10 [ 1263.012622] ? proc_free_inode+0x20/0x20 [ 1263.013168] alloc_inode+0x84/0x240 [ 1263.013673] new_inode+0x23/0x250 [ 1263.014122] proc_pid_make_inode+0x22/0x220 [ 1263.014728] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.015404] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1263.016145] proc_pid_instantiate+0x50/0x1e0 [ 1263.016714] proc_fill_cache+0x373/0x4a0 [ 1263.017341] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1263.018101] ? pid_update_inode+0xa0/0xa0 [ 1263.018646] ? pointer+0xa80/0xa80 [ 1263.019100] ? snprintf+0xbb/0x100 [ 1263.019590] proc_pid_readdir+0x3d3/0x830 [ 1263.020142] ? proc_pid_lookup+0x460/0x460 [ 1263.020676] ? inode_security+0x107/0x140 [ 1263.021232] proc_root_readdir+0xa0/0xd0 [ 1263.021749] iterate_dir+0x584/0x710 [ 1263.022227] __x64_sys_getdents64+0x13a/0x2c0 [ 1263.022827] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1263.023398] ? fput_many+0x2f/0x1a0 [ 1263.023905] ? fillonedir+0x4b0/0x4b0 [ 1263.024393] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1263.025059] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1263.025732] do_syscall_64+0x33/0x40 [ 1263.026206] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1263.026856] RIP: 0033:0x7f85507e0b19 [ 1263.027329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1263.029715] RSP: 002b:00007f854dd56188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1263.030688] RAX: ffffffffffffffda RBX: 00007f85508f3f60 RCX: 00007f85507e0b19 [ 1263.031601] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1263.032540] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1263.033475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1263.034428] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 10:14:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:14:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:14:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x10000000, {{0x2, 0x4e23, @rand_addr=0x64010101}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0xbc) pread64(r0, &(0x7f0000000140)=""/187, 0xbb, 0x100000000) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1263.104893] loop3: detected capacity change from 0 to 135266304 [ 1272.209372] hpet: Lost 1 RTC interrupts 10:15:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 19) 10:15:03 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x8001, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1004) 10:15:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x104c) 10:15:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1276.979682] loop3: detected capacity change from 0 to 135266304 10:15:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x18) 10:15:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1007) [ 1277.034138] hpet: Lost 3 RTC interrupts 10:15:03 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000001480)='./file0\x00', &(0x7f0000000000)='aio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x5, 0x3, 0x19, 0x10, "7748c307709d22a7a6b85530ff1cb8c5fbe1ca956dbe58177a2bf684048faf5be215159f4824d36fdcb51423e762fc89505380b32212997af0491c69c543e6a1", "4075e2604e1ca6c26e7c687012873f8f92c4629c8da5545bdf623fc7f37a1c85", [0x4, 0xfff]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r2, 0x200, 0x70bd26, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x2, 0x10}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_CRIT_PROT_ID={0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x20040010) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0xd885237a86bb959, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000140)={0x800, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e22, @rand_addr=0x64010102}}}, 0x108) getdents64(r1, &(0x7f0000000480)=""/4076, 0xfffffffffffffead) [ 1277.047856] FAULT_INJECTION: forcing a failure. [ 1277.047856] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1277.049652] CPU: 0 PID: 7228 Comm: syz-executor.5 Not tainted 5.10.238 #1 [ 1277.050553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1277.051634] Call Trace: [ 1277.051988] dump_stack+0x107/0x167 [ 1277.052485] should_fail.cold+0x5/0xa [ 1277.052978] _copy_to_user+0x2e/0x180 [ 1277.053493] simple_read_from_buffer+0xcc/0x160 [ 1277.054124] proc_fail_nth_read+0x198/0x230 [ 1277.054673] ? proc_sessionid_read+0x230/0x230 [ 1277.055301] ? security_file_permission+0xb1/0xe0 [ 1277.055921] ? proc_sessionid_read+0x230/0x230 [ 1277.056506] vfs_read+0x228/0x620 [ 1277.056955] ksys_read+0x12d/0x260 [ 1277.057430] ? vfs_write+0xb10/0xb10 [ 1277.057917] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1277.058600] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1277.059292] do_syscall_64+0x33/0x40 [ 1277.059798] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1277.060451] RIP: 0033:0x7f855079369c [ 1277.060927] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1277.063356] RSP: 002b:00007f854dd56170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1277.064327] RAX: ffffffffffffffda RBX: 00000000000007b0 RCX: 00007f855079369c [ 1277.065279] RDX: 000000000000000f RSI: 00007f854dd561e0 RDI: 0000000000000006 [ 1277.066231] RBP: 00007f854dd561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1277.067141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1277.068051] R13: 00007ffe195fd33f R14: 00007f854dd56300 R15: 0000000000022000 10:15:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1002) [ 1277.208956] loop3: detected capacity change from 0 to 135266304 10:15:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1048) 10:15:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1068) 10:15:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket(0x2b, 0x800, 0x101) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x75, 0x0, 0x3, 0xfffffffffffffffb, 0x2, 0x3, 0x4, 0x3c, 0x40, 0x10a, 0x5, 0x40, 0x38, 0x2, 0x1ff, 0x7fff, 0x7}, [{0x70000000, 0xd1, 0x9, 0xa2, 0x2, 0x2, 0x1820, 0x7f}, {0x5, 0x2, 0xa13d, 0x8, 0x7, 0x2, 0x1, 0x8000}], "35103af21458fc2160b6e1b513d2ab69ce94f86a45265abafa850136d48b1730f33292ba9793ba1fcf8769f72affccebe932afdb68fbaa480c51729edde976d63484ed59cc86b363b18944856c9612bc4bcf435a5a032a41029a40ff071c0ad1815910b3d5c5232f50c3bd4e140e78271dbbf0d9", ['\x00']}, 0x224) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffff7e}, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) openat(r3, &(0x7f0000000040)='./file0\x00', 0x400002, 0x78) [ 1283.654196] hpet: Lost 1 RTC interrupts [ 1285.054465] hpet: Lost 1 RTC interrupts [ 1285.173365] hpet: Lost 2 RTC interrupts [ 1286.381459] hpet: Lost 1 RTC interrupts [ 1286.405469] hpet: Lost 1 RTC interrupts [ 1287.473443] hpet: Lost 1 RTC interrupts [ 1287.501516] hpet: Lost 1 RTC interrupts [ 1287.821470] hpet: Lost 1 RTC interrupts [ 1288.445549] hpet: Lost 3 RTC interrupts [ 1288.477517] hpet: Lost 1 RTC interrupts [ 1289.549473] hpet: Lost 1 RTC interrupts [ 1289.577526] hpet: Lost 1 RTC interrupts 10:15:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x104c) 10:15:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x18) 10:15:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1003) 10:15:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x106c) 10:15:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001e0001000000000000000400fe8800000000000000000000000000010000000000000000ac14140969030cbadd65cdf4a275c20e1d87bb000000000000000000000000000000000000000008000c0000000000"], 0x48}}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r2, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) syz_io_uring_complete(r1) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x800) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYRESHEX, @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08200103", @ANYRES32, @ANYBLOB="0c00060000000000000000000c0005000a010000000000000c00030008000000000000000c00050021010000000000000c0003000600000000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x20000880}, 0x4000880) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400), r3) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x4c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6c8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004040}, 0xc004) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r6, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x104}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000041}, 0x804) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) 10:15:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1291.627688] loop3: detected capacity change from 0 to 1024 [ 1291.641985] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 10:15:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1068) 10:15:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1002) 10:15:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1074) [ 1291.746158] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 10:15:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1004) [ 1291.841272] loop3: detected capacity change from 0 to 1024 10:15:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x106c) 10:15:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1007) 10:15:32 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x2, &(0x7f0000000200)=[{&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:32 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x82000, 0x19a) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000140)={0x2}) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x107a) 10:15:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1003) [ 1305.751102] loop3: detected capacity change from 0 to 1024 10:15:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:32 executing program 6: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x198, r1, 0x20, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_RULES={0x124, 0x22, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x800}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x10001}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x2}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x1c9}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x6}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x9}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x100}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1000}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x30000}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xffff}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x9cf}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xfb0}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x1c}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x81}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xfffffff9}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xffffffc1}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x9}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4d6e39dd}]}, {0x54, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x3}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x9}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x5}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x800}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3d0}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xffffffc0}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x80000001}]}]}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xa9}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x78}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7a}, @NL80211_ATTR_REG_RULES={0x28, 0x22, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x100}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x92}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x4}]}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x2}]}, 0x198}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f00000003c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, r2, {0xfff, 0x5}}, './file0\x00'}) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:15:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x4000) 10:15:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:32 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1048) 10:15:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1004) 10:15:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1074) 10:15:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1305.958213] loop3: detected capacity change from 0 to 135266304 10:15:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000140)={0x200, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e23, @private=0xa010102}}}, 0x108) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1319.417744] hpet: Lost 1 RTC interrupts 10:15:53 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x6000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x800, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) umount2(&(0x7f0000000040)='./file0\x00', 0xa) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x104c) 10:15:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x20, &(0x7f00000001c0)='proc\x00') setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x8, {{0x2, 0x4e23, @empty}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x107a) 10:15:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1007) 10:15:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1326.607456] loop3: detected capacity change from 0 to 135266304 [ 1326.611129] proc: Unknown parameter 'proc' 10:15:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:15:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x400000, 0x150) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000040)={@remote, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 10:15:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:15:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000200)={'mangle\x00', 0x0, [0x8, 0xff, 0x3, 0x80d, 0x1]}, &(0x7f0000000040)=0x54) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) getdents64(r1, &(0x7f0000000140)=""/51, 0x33) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:15:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x4000) 10:15:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1021) 10:15:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1068) [ 1326.774107] loop3: detected capacity change from 0 to 135266304 10:16:08 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x106c) 10:16:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 1: ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) socketpair(0x2c, 0x2, 0x7b33, &(0x7f0000004200)) getuid() recvmsg$unix(0xffffffffffffffff, &(0x7f00000045c0)={&(0x7f0000004240)=@abs, 0x6e, &(0x7f00000044c0)=[{&(0x7f00000042c0)=""/234, 0xea}, {&(0x7f00000043c0)=""/238, 0xee}], 0x2, &(0x7f0000004500)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xa0}, 0x0) r4 = getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005640)=0x0) getresuid(&(0x7f0000005a80)=0x0, &(0x7f0000005ac0), &(0x7f0000005b00)) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005b40), 0xb00, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005b80)={0x0, 0x0}) r9 = geteuid() statx(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r10, r11, 0x800) [ 1341.452147] loop3: detected capacity change from 0 to 135266304 sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005cc0)=[{{0xfffffffffffffffc, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="778675923a7cb41aad", 0x9}, {&(0x7f0000000180)="b47eff31259fdefe31691733558372d105da324cd8b1d25711471eebbbc878f32ff6f6876c5a36f46979c9bab5f333bff8817287679cc72fc426245b5af7766b1e2769f5ede37d21ee72b1631c6233c2272776edee7bbed526f36295cb143a44c7b5f2ea08eaeba83f4ae422b16c8a33f73821b2471eb5f630e46a70077160bc9fcf586052803e6f8488cd4525bf3bf8a83e40ad7521efed5effeb6eacf44aa5dd4a5f22e0459a849a1bc164f5a2623fe3449577ac708029912be2c542ed6b648005ff4379f412c57c", 0xc9}, {&(0x7f0000000280)="b6d7e73d09a45b3304bd43ed7ddc38d869f77a56bae2000f4fd683a875b90060acd3313e4cfd9807ca23aefe555e9bf760ea8339729532114b13e7d38106f93073d261bd5a2f6943757c3f1265125b9a4682d0f390cce893a7967c2f3cc2048149e0b99d45d773cd2c3b645becf93f0699e274e2419a1f4b11324c96610044ff54b28a8c2eda75871ce5af65e08064f6968d6bcd46753246935e1348bf3441ff0592a34b8bf032bc48e29fc9408747b7b8f5260b0aa56b27d800d7", 0xbb}], 0x3, &(0x7f0000001900)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78, 0xc804}}, {{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000000500)="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", 0xff}, {&(0x7f0000000600)="8547fa4616b97d06326417d332d3a5d46f07313bb1eb493ae6c3827ff2c7ff36300180a9b9de173d8348ad467e205cdf8da1eeff", 0x34}, {&(0x7f0000002e00)="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", 0x1000}, {&(0x7f0000000640)="e95cab85d4c02ffa94c23b12539d2e20e7b4665f3b4a9482912f90f8b2436b171aefc9ef3f5ba3f8586b66e192449b9a95eb800cdac748753f9b81e806265b8e03de9e1d32544328b3b6bbab2cb6661765e1458b0eac9cf4cc4e36bb9e6744b94e5b05e0c9b20a3fd5695bbcd5c3f70129ca3fef0f605c2a0ed647561ac102900ac80912f75089580d98dc3996fe3177434b49cbbe6ca62984041aa52abf74e29a2473eef1084b0ae39ef8334714ce28345fabb69543ac513afd5d196cf462fc07458f3d18db82f5c721e5ad4a29cbac0ece39c3bb12fcb567", 0xd9}, {&(0x7f0000000740)="6fdab794e4461fcf1cc34a6f2b85f4d9ca8d972589e97899ca5388255b1d3b7c7280a80aa471c7360548efb93a7a51c52567db1794b0cf0aac7ff1cba72e9fed94df369a5c19b742bcf2a3ba", 0x4c}, {&(0x7f00000007c0)="e613b77d80c75b4d1e92e65cd4e23fd099581184614154addcc42ff3bf1a8c18df54a550eb8c9edf55a06dbd98beadc9224b81961a215826ff99d53bc297736d358ca0ba2fe8f36db0fc0fa99bf95223", 0x50}], 0x7, &(0x7f0000003f80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8, 0x4000004}}, {{0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000004080)="a46463a38a0029dbf75d613a85a7c5f8feb737a49dace1ef285acf131c39c57e89563d346c3eb64ae1cdea27553c09681bf6fdffef7094e2e4682d4d84aca4f4d0f3829e9ff2a69fcb4db7b02d4df395789498fd1e1b577f7ecb7b9abee82a901cd01d7497414a50cb45c3dc37aa6a58b378ff463e00598890bfb0462e7f7330af312a92f45e899b12cdc009327b7dcb3384d9412275f5f2fcfbfd8b74ab8e6f0333456f087502b5f95fb9f8600e34f35a0504b6e037b6ec912d4b5a4dbc1f", 0xbf}], 0x1, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [r1, 0xffffffffffffffff, r2, r1, 0xffffffffffffffff, r7]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, r7]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r11}}}], 0xe8, 0x48e1}}], 0x3, 0x8080) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r12 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) openat(r12, &(0x7f0000000040)='./file0\x00', 0x131243, 0x140) getdents64(r13, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 6: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000300)={0x324, 0x81, 0x6}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xb6f, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000240)={'raw\x00', 0x0, [0x4, 0x2, 0xfffff0b0, 0x3, 0x3]}, &(0x7f00000002c0)=0x54) openat$vcsa(0xffffffffffffff9c, 0x0, 0x82501, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x1b, 0x2, 0x9, 0x0, 0x2, 0xa0042, 0xf, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040)}, 0x0, 0x9, 0xee71, 0x8, 0x5, 0x1, 0x1, 0x0, 0xaae, 0x0, 0x101}, 0xffffffffffffffff, 0xb, r2, 0xb) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1024) 10:16:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r4, r3, 0x0) dup3(r1, r3, 0x80000) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1074) 10:16:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1048) 10:16:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) ioctl$BTRFS_IOC_SNAP_DESTROY(r3, 0x5000940f, &(0x7f0000001e00)={{r0}, "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"}) 10:16:08 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1341.662583] loop3: detected capacity change from 0 to 135266304 [ 1355.318194] hpet: Lost 1 RTC interrupts 10:16:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x40100, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:22 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:22 executing program 1: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000140)={0x0, 0x4, 0x8000}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) 10:16:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x107a) 10:16:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x104c) [ 1355.851387] loop3: detected capacity change from 0 to 135266304 10:16:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:22 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x120001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffffffffffffd}}, './file0/file0\x00'}) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') 10:16:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000140)=0xffff, 0x4) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) mknod(&(0x7f00000005c0)='./file1\x00', 0x1000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x7}}, './file1\x00'}) ioctl$VFAT_IOCTL_READDIR_SHORT(r4, 0x82307202, &(0x7f0000000380)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r3, &(0x7f0000000100)=0xfffffffffffff674, r5, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2b, &(0x7f0000000200)={0x6, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e20, @private=0xe9}}}, 0x108) 10:16:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x4000) 10:16:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:22 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b", 0x43, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1068) 10:16:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) recvmmsg$unix(r2, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r4, 0x5453, 0x0) ioctl$FIONCLEX(r4, 0x5450) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) syz_open_dev$tty1(0xc, 0x4, 0x2) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r6, r7, 0x800) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000840)=0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140), 0x130012, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e983d66642c72666408003d4f3c1ca413d6b3ecb4d5254a6bcae707813b5821bc10a81d201b5c7844265b8fe4a42e4360380fe6d318", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',mmap,access=', @ANYRESDEC=r5, @ANYBLOB=',access=client,noextend,loose,uname=*.#$,msize=0x0000000000000006,uname=,privport,fscontext=sysadm_u,fsmagic=0x0000000000000003,smackfstransmute=proc\x00,subj_user=-,euid<', @ANYRESDEC=r6, @ANYBLOB=',fsname=proc\x00,uid>', @ANYRESDEC=r8, @ANYBLOB=',smackfsdef=proc\x00,smackfsfloor=proc\x00,seclabel,\x00']) [ 1356.027561] loop3: detected capacity change from 0 to 135266304 [ 1358.114229] hpet: Lost 1 RTC interrupts [ 1359.126305] hpet: Lost 4 RTC interrupts [ 1360.426390] hpet: Lost 2 RTC interrupts [ 1369.850403] hpet: Lost 1 RTC interrupts [ 1370.147521] hpet: Lost 1 RTC interrupts 10:16:37 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x20000, 0x10c) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000200)=""/4112, 0xdad) 10:16:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x106c) 10:16:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x5, 0x440000) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x40010, r0, 0x3757d000) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffff7f}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000140)={0x8}) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x3, 0x80, 0x4, 0x3, 0x2, 0x9, 0x0, 0x8, 0x800, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000140), 0xc}, 0x41, 0x8, 0xf2, 0x3, 0x5, 0x4, 0x2, 0x0, 0x0, 0x0, 0x4}, r3, 0x5, r1, 0x10) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r4, r5, 0x800) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000300)='./file1\x00', 0x7, 0x2, &(0x7f0000000400)=[{&(0x7f0000000340)="69ec4245b6b22a93edf1746a2e18", 0xe}, {&(0x7f0000000380)="6901a8ef06df18375badcf0dc9cadaf098ef9bc3eaf73ee7c9d60234db436a4db45e71465fb55e8088aba880490f968fdc1956bf3dbb0507940757327560494f3728e27fb3f6ce1537d562f84a825c9145", 0x51, 0x314}], 0x4080000, &(0x7f0000000440)={[{@uid={'uid', 0x3d, r4}}, {@size={'size', 0x3d, [0x31]}}, {@mpol={'mpol', 0x3d, {'default', '=relative', @val={0x3a, [0x2f, 0x35, 0x39, 0x34, 0x32]}}}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@smackfshat={'smackfshat', 0x3d, '?@&\xc5\x8e)'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x50) getdents64(0xffffffffffffff9c, &(0x7f0000000240)=""/119, 0x77) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b", 0x43, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r0, r1, 0x800) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x5, 0x3, &(0x7f0000000440)=[{&(0x7f0000000380)="461b9a129956e751594769e564b8eef599193151", 0x14, 0x5}, {&(0x7f00000003c0)="191dbdcce814b72e71d143f56c", 0xd, 0xb4}, {&(0x7f0000000400)="f2158a7834f4ac1cc385fafdd7d4790000000000000008a502f3590e", 0x1c, 0x8}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="6461782c64696f726561645f6e6f6c57636b2c67727069642c6e6f6c8e58c39e428a3570696e6f64655f72656164616865616456626c8a733d3078303030303030303030303130303130302c66756e633d4250524d5f434845434b2c736d61636b6673666c6f6f723d66756e632c6f626a5f747970653d726f6469722c657569643c", @ANYRESDEC=r0, @ANYBLOB=',rootcontext=user_u,\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x852, 0x2, &(0x7f0000000280)=[{&(0x7f0000000180)="9f6cb45efa014f98c7ae389d479f825f226036438987603323a17e9a35b496ee1e7397ebcd5e2d56809df91ea0df1c8e2fb689799e298eb91cf111708fc9923b804f9af87e82a8c361ed99", 0x4b, 0x82}, {&(0x7f0000000200)="c5de0069aae1584e55e282860bd1b503def61128ceebde7f69d186ad2c88237ce26e62f858363ac3c290390db395e9be8730e82bf5013a552495df50e6a2ef94c539c99a", 0x44, 0xffff}], 0x20012, &(0x7f00000002c0)={[{@rodir}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, 'proc\x00'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) [ 1370.480767] loop3: detected capacity change from 0 to 135266304 [ 1370.498733] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 10:16:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1074) 10:16:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x107a) 10:16:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b", 0x43, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r1, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf4a4d938902ec475}}, './file1\x00'}) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r5, r4, 0x0) openat(r5, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) dup3(r2, r5, 0x80000) r6 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x208000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) 10:16:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000238f5dc05ffb55726ea3b00a682282001900000008000300", @ANYRES32=r3], 0x28}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) recvmmsg$unix(r4, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) r6 = syz_open_dev$hidraw(&(0x7f00000003c0), 0x81, 0x400000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd=r6, 0xa08c, &(0x7f0000000400), 0x0, 0x2}, 0x10001) sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000005c0)={0x1c4, r2, 0xc08, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x1a8, 0x11d, 0x0, 0x1, [{0x5c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xd9}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x34, 0xd, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x30, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x15, 0x2, [{0x5, 0x7}, {0x3, 0x4}, {0x5, 0x7}, {0x6, 0x1}, {0x1, 0x7}, {0x5, 0x4}, {0x6, 0x9}, {0x7, 0x2}, {0x1, 0x6}, {0x2, 0x8}, {0x1, 0x3}, {0x2, 0x1}, {0x5, 0x5}, {0x4, 0x4}, {0x4, 0x7}, {0x4, 0x3}, {0x3, 0x3}]}, @NL80211_TXRATE_LEGACY={0xa, 0x1, [0x1, 0x1b, 0xb, 0x5, 0x36, 0x16]}]}]}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x2}]}, {0x30, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x38}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x3}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x9b}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x2}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xdb}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x7e}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}]}, {0x54, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x2}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xc}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x9}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x9e}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x38}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x28}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x38, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x34, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x1000, 0x8, 0xc6, 0x7, 0x7, 0x9, 0x1, 0x200]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x88, 0x2, 0x8, 0x6, 0x4, 0x6, 0x2, 0xaa]}}, @NL80211_TXRATE_HT={0x8, 0x2, [{0x1, 0x6}, {0x4, 0x9}, {0x0, 0x8}, {0x2, 0x7}]}]}]}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xbf}]}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x800}, 0x801) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x64, r2, 0x408, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2b}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x221}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x8810}, 0x40000) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) [ 1370.662970] loop1: detected capacity change from 0 to 130560 [ 1370.698412] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1370.728472] loop3: detected capacity change from 0 to 135266304 [ 1374.346482] hpet: Lost 1 RTC interrupts [ 1374.454442] hpet: Lost 2 RTC interrupts 10:16:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a", 0x65, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000, 0x0, 0x0, 0x1020418, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) recvmmsg$unix(r0, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@local, @empty, @empty}, 0xc) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x2000, 0x5, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x4000) 10:16:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000140)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)={@remote, @loopback, 0x0, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x14) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = syz_io_uring_complete(0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000040)=0x3) 10:16:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000140)=@v3={0x3000000, [{0x2000000, 0x1}, {0x4, 0x7fff}], 0xee01}, 0x18, 0x2) 10:16:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x3, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @multicast1}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffeff7e}, 0x1000, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x59) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1384.670100] loop3: detected capacity change from 0 to 135266304 10:16:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a", 0x65, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x81, 0xc6, 0x1, 0x30, 0x0, 0x4, 0x10000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x7f, 0x81}, 0x20, 0x2, 0x1, 0x3, 0x2, 0x0, 0x6, 0x0, 0x8, 0x0, 0x49a9}, r0, 0x2, r1, 0x8) dup(r2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80, 0x90}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) socket$inet(0x2, 0x0, 0x7f) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = signalfd(r0, &(0x7f0000000140)={[0x8]}, 0x8) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) utimes(&(0x7f0000000580)='./file0\x00', &(0x7f0000000600)={{0x77359400}, {r3, r4/1000+60000}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x18c, 0x2e, 0x100, 0x70bd2d, 0x25dfdbfb, {0x1}, [@typed={0x8, 0x65, 0x0, 0x0, @fd=r2}, @typed={0x8, 0xb, 0x0, 0x0, @pid=r5}, @typed={0x8, 0x35, 0x0, 0x0, @u32=0xfff}, @generic="bc471599ad329bb4f6eb5275a46e8de926daebf42149a8a48cc4646350af394d3bc91582bdb407a596e7e35d8b17b387811af97312b0109c12b28b6a9fc628194720bf5278d0f08f602880fdff7ba7abec7d7270c218cd0c25a31b97f810e9a4bf5b86f186da8ee7981f7dc505a3b2cffb3d6f6049e0ad58e07afd77e575e172814bab8e1b8604b666a47c93cc5009a1f54c5b04d298b18e6e9d2f96e89774cd235c3c5f58f13cbbbc", @generic="c4b90c7f4e672372ab3cfd3d2c4860c49298670dabbb3c5443f2e4308c030be39ce6a551fafabd01acb95e4ae45de5088ed1267d4c3ddf3410f3fffe8e018ccefcf77aacff02991b15de90e1bfa986e533f55e92c247f20f21019bc3c0688628427a7f62e1f933aa20abde0f7a6a64149b83ba204144c4b298f34c3726c53a9fb37bca1f1ed94029f0506a8764d482932046c2f961f5a214bcf14d1d37e945c01a2d3ca52af29d85eab897b893db682a1fa8b464"]}, 0x18c}, 0x1, 0x0, 0x0, 0x4000}, 0x48000) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1384.829588] loop3: detected capacity change from 0 to 135266304 10:16:51 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, r2, 0x0) move_mount(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x42) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000200)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000001e00)={{r3, 0x0, 0x1, 0xf6, 0x8, 0x4, 0x3, 0x5, 0x5, 0xbf93, 0x0, 0x4, 0x2d99, 0x100, 0x200}}) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001880)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000400)='ext3\x00', &(0x7f0000000440)='./file0\x00', 0xffffffffffffffc1, 0x5, &(0x7f0000000740)=[{&(0x7f0000000480)="133cfdb9b60334d0410432253a494085670458186c395cd84b284b42a53c8f74ecca2e5e8b1562dbb4da72f1ff1a", 0x2e, 0xfffffffffffffff8}, {&(0x7f00000004c0)="438b39ad370b36f61e64e75b832d20bd0af412721c525ce495dac6d3a79e477ba83610eaba601cc59eabb14f34f1acf53e30e1bba1a0fe37b44148d6975a8f0f00d4677e3812b6341c014be9d07aaf6e6843899fff7169b67e709ddfd7fe8a65aff23bb059aefdbb667d957921250a22b318980f60eae9325d829dfe56c933e8bf00417ac94c26c9ef7d269adc43e959127e4b7213c083cfbe83309c190655fa793395a4145a42890530601bf94e34f0a927f090f996d67b73519d87143f3a8befcc0379fad5b0ee9254e9fb4b04ff5f7e7e31590bc76a3b5b70035fd66b3305a584", 0xe2, 0x24000000000000}, {&(0x7f00000005c0)="19cf51f65e30cf9cd33835931e8ce6e4fc0ff1a7dbf7840dc8e32d305c6373359dd1707cffe4851cab1c1dbaaf2921f2dd565379b46544e4bf56176b76928fb1f367ab21e6ff50b679ce625da74e33789ee325cee85341f11eb1267e7fe797a9a88b31fea85b0fea1411871021735e66f6df702d3c43e2a36baf9f8aef7124a952a8480afc4b363e76ba0bcf1088013cc2bb2dd0c17ed2255c193b8ee480b1", 0x9f, 0x4}, {&(0x7f0000000680)="3ba61eaaf30cc09884c0894dc74c15ee5317237cb7bde4d31b0b695c21f8031a2d35f2ee8dd445904f936bb873b7876446852331440b60b594ccf7b07b3b55bf5a1b1e8d803d7a6ad04bdb7ce06b681c36dc9d", 0x53, 0x7}, {&(0x7f0000000700)="5fe8abe9c38260bcee529e4694e611", 0xf, 0x20}], 0x200000, &(0x7f0000000800)=ANY=[@ANYBLOB='errors=remvunt-ro,smackfsfloor=,dont_appraise,uid>', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r4, @ANYBLOB=',\x00']) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:16:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1384.924562] loop2: detected capacity change from 0 to 135266304 [ 1384.935824] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:16:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x82, 0x1) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e22, @loopback}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0xa, &(0x7f0000000180)=[{0x5, 0x6, 0xe2, 0x7}, {0xdcab, 0xff, 0x2, 0x7}, {0x9, 0x1, 0x8, 0x1}, {0x9, 0xfc, 0xcf, 0x2}, {0xc37, 0x9, 0x7f, 0x2}, {0xfff9, 0x0, 0x8, 0x6}, {0x0, 0x7f, 0x1, 0xfffffff7}, {0x5, 0x6, 0xcc, 0x5}, {0x8, 0x9, 0x0, 0x8001}, {0x6, 0x7, 0x24, 0x3f}]}, 0x10) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1385.018810] loop2: detected capacity change from 0 to 135266304 [ 1385.027466] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:17:05 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a", 0x65, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:05 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0xffffffffffffff5e) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {r0}}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) r5 = syz_open_dev$sg(&(0x7f0000000040), 0x3, 0x40000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000001, 0x10, r5, 0x848cd000) 10:17:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000380)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x4000, @fd_index=0x4, 0x4, 0xac, 0x5, 0x9, 0x1, {0x1}}, 0x3f) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, r1, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="bb487417e3f88035905be2a90099482c02d39dea7d777400c372d901341258db142d3e2a36243807f8fbd60637e1860a5702d071df33e0341d4a9afa073cdb65e84b80b8d2fd5cc846e8b4759b38211c4cf18871b6972be97abc6224a63ee9c44608b42ad2c88d07b5fc95362cc444768b955198d30849a3532d533d8d0884d562b05611dd00c50307af8509", 0x8c}, {&(0x7f0000000200)="591dcc3ed0c64f9adce158ee88419bef86860d7714054e243bce9496f5b427be744d40c73ed03ad0503ae1bdace0950c10afc980cfbb126a7a1e550006c0cdac2b5cb1a6cb25f2fda2cae8f316ca61ad40a16e3a1e4eeaffe464695a62ffe350ea3695fb05725f0f84a422a1f3ede90555640edb68469e9a8b7bbbd3ba45fe97d1134ec3cf64062f6d6edce0e6242297d4c15ad495eb71f3e89951f0181f3f44010e2124ffd4c7dd8aa513cd5a", 0xad}, {&(0x7f00000002c0)="69a520ea7d0fc0cf54e64b3c6e0d907ab6d2a8805638c0e998afa6decdd13c45cd03d43a4c55bcfe2f4279a7c5eed600eb14ed61a697bcb84e3296a3570ee098b39607d67b305de56e17a26d719783ac0facf09088b40f94b0597b3f8906f48cb8ad4a26afa9c6ad440d261840f1db8e99cac280bd3c14120ddb1b399caecedc0a9bc63104f2628ef0caef594fe0d207b75ec117a1cb02387cfd70cbb56c54a923", 0xa1}], 0x3) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:17:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x18000, 0x60) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x80000000, 0x8000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000340)={0x7617, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e22, @broadcast}}}, 0x108) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r6, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) recvmmsg$unix(r5, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) openat2(r5, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x6078eeb4c1c778b4, 0x16}, 0x18) 10:17:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r0, r1, 0x800) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x40, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="7e2f855bbae923002d37315655bfbd0b831fca38f850f0f0c4b3335b20f8d6d7d06dbb3a5071b467230ff25f8dc7fd18724225c988cb0556b48cecbbb9de31612828c1e46d9004", 0x47, 0x3}], 0x5000, &(0x7f0000000340)={[{@mblk_io_submit}, {@nouser_xattr}, {@barrier}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@audit}]}) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000001e00)=""/4097, 0x1001) [ 1399.046957] loop3: detected capacity change from 0 to 135266304 10:17:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) 10:17:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:05 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x7, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000001e00)=""/4076, 0xfec) [ 1413.157663] loop3: detected capacity change from 0 to 135266304 [ 1413.171230] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1413.198029] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 10:17:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:17:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) 10:17:19 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd40", 0x76, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x81, 0x0, 0x0, 0x240c9, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x80400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x0, 0x5}, 0x0, 0x0, r0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000140)={0x1, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e24, @multicast2}}}, 0x108) 10:17:19 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000180)=0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r2, r3, 0x800) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x400, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r6, r7, 0x800) r8 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x1}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x5, r1}, {0x2, 0x5, r2}, {0x2, 0x2, 0xffffffffffffffff}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x1, 0xee01}, {0x8, 0x2, r4}, {0x8, 0x1, r5}, {0x8, 0x0, r7}, {0x8, 0x4, r8}, {0x8, 0x7, 0xee01}], {}, {0x20, 0x2}}, 0x84, 0x1) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) socket$inet(0x2, 0x805, 0x1) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r9, &(0x7f0000000880)=""/4096, 0x1000) 10:17:19 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x80010, 0xffffffffffffffff, 0x8000000) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001e0001000000000000000400fe8800000000000000000000000000010000000000000000ac14140969030cbadd65cdf4a275c20e1d87bb000000000000000000000000000000000000000008000c0000000000"], 0x48}}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r3, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) r4 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000280)=0x0, &(0x7f0000000140)=0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r7, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x40) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r7, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r4, 0x8000000) syz_io_uring_submit(r8, r6, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, 0x80000001) syz_io_uring_submit(r2, r6, &(0x7f0000000040)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd_index=0x7, 0x0, 0x0, 0x7, 0x8, 0x0, {0x0, 0x0, r0}}, 0x0) 10:17:19 executing program 5: add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="b88bb39d803fbde04921d2aca1464f21375ab2e17a2922484c90d287f8ef7ea3a5352ca23fa8fe6c1c5f1a839b340edc9cf6dcdc3f331e31ad78887987dbfd09e4936c6ba14dffe14216140353c7d127d94c8c048294bff1e8688efd4183d9dcba2c4d6647922f2d62ae2bd27515efa4610bd677e1caee1ac49b059cb4333190e5d7b4273abb211753a3f95a3eef17c444fc059ea65579a9e14bd97778d09d2aadfee1ef621bd2e3c452c3fc9185ad02c764592c45b29f20713d70783b62cdfc2369c3dcda8774420096851acbdd906253ed4794b5eeed0a4f0009ce7f742c0905698c767cce0468bd64e89594686cb49211", 0xf2, 0xffffffffffffffff) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat(r0, &(0x7f00000003c0)='./file2\x00', 0x80000, 0x40) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r3, &(0x7f0000000100)=0x6, r4, 0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000340)={0x2, 'veth1_to_batadv\x00'}, 0x18) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) openat(r3, &(0x7f00000006c0)='./file2\x00', 0x14002, 0x4) r6 = signalfd(0xffffffffffffffff, 0x0, 0x0) dup2(r6, r2) connect$inet6(r3, &(0x7f0000000380)={0xa, 0x4e22, 0xbb61, @remote, 0x9}, 0x1c) recvmsg$unix(r2, &(0x7f0000000780)={&(0x7f0000000400)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000540)=""/76, 0x4c}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/4101, 0x1005}], 0x4, &(0x7f0000002e00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYBLOB="fdc1b804e6beef42a5d774e0f412ac467e9e14cd0353d7bfe6b1c186620873e8b49167ba25925e8b8478ee7d012236ac3350a0", @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYRESDEC=r2, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="901fb1919d45af9f9b5459f9cc09a5d575f87f1bc6be20b1b03fd35c526a87b5e1af0168c27f73d6294a189c9cff695c014dbf4d", @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000010000000100000000020000000000000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32], 0x150}, 0x2041) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000800)={'wg0\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="4700000008000000030000000001000053aa27d9008000000600000024faffff00000000ff070000000000020000000000000002000000b82eb8073c4caf40cc9634ac2339a5e29cf3a12b758028ddc51ffa1051803e61fd25df6ba8c9c6d8e368c6e65979f2abd68dab70ee3358e0d4a20371b2b94a4a2d3de754eee2bb8d65bbbec31d34a6efe252e73e66d596796c0000000000"]}) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) 10:17:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd40", 0x76, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) recvmmsg$unix(r3, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x28000, 0x0) renameat2(r3, &(0x7f0000000200)='./file0\x00', r5, &(0x7f0000000280)='./file0\x00', 0x0) openat(r2, &(0x7f0000000140)='./file0\x00', 0x101000, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) readlinkat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/56, 0x38) 10:17:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) 10:17:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0xffffffff, 0xc622}}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) umount2(&(0x7f0000000040)='./file0\x00', 0x5) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = open_tree(r0, &(0x7f0000000200)='./file0\x00', 0x100) close(r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1413.322884] loop3: detected capacity change from 0 to 135266304 10:17:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, 0x0, 0x0) 10:17:20 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x101, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) getdents64(r0, &(0x7f0000000040)=""/43, 0x2b) [ 1419.522872] hpet: Lost 2 RTC interrupts [ 1420.998975] hpet: Lost 1 RTC interrupts [ 1421.730937] hpet: Lost 1 RTC interrupts [ 1421.906898] hpet: Lost 4 RTC interrupts 10:17:34 executing program 4: sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="a8000000ed0310002bbd7000fbdbdf2522c5cc8ee7c41dcbb29d765e9644b8424c15f4e9a380b7b435d21b30a099a5e68cda8c3f09d54c47c848e7b4b357cb11d6c8bafeb1d9f937d58ad9d6ca303d98e9adcca92f727ec93b19fea6f2e1a6ba861ebf297159e4afc7506a78fc9144938daa08e4f602290dcc4179d54b799e2b1e6a1ce167b108b6009e2cb9dff4b252f75b7f7f8a8496921a1c19e58622a65d6fe0b313ff950000"], 0xa8}, 0x1, 0x0, 0x0, 0x810}, 0x24000080) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='hfsplus\x00', 0x0, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='efivarfs\x00', 0x4000, &(0x7f0000000380)='net/packet\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip_vs\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) openat(r2, &(0x7f0000000400)='./file0\x00', 0x781302, 0x0) dup3(r1, r0, 0x0) openat(r1, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) flock(r1, 0xf) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:17:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x1, 0x10010, r0, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f00000002c0)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000880), &(0x7f0000000000)='./file0\x00', 0x609, 0x1000, 0x1}, 0x8) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIOCLEX(r1, 0x5451) sendmsg$nl_generic(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB="2400000010000100000000000000009600000900050000000000000005000080480000f8bc81b87afc1f961b041591112692a5d1aab19c6a9e208d1c28da156afb4ddd1c034b19e9834dac56f129ae740f48534d34c69c7c8f7a384336ebb2944c29225ff12f8b046906f15c85d62e0a33ee1e26fa8cdafd5b4230f8a3080ce94c020921c94d3d80cf8e3b0005243578f5cb037d73d389cfca1f80e0d2f968feac4f065ffe3db02b1fd43abc07e6b5975ba7d712426b37c55d1e490df0153a78786913ed7637b1d840bfde0e1b7d339417ed280b1ddb49ee61eafedbaaa0a8d2cbc5bdccb0afa62f64ea4ff187fa6628397f9891a1f34aa8dd36d70ce1b5f09bc0043a0ba78b59e433e073ebbcea086bc8e8da27d76939786776a523785c8d9f855bdebf1edf10e03337ab01cd5cf01d1029cd73f7ed80e25303ae4adcc92c32141d362f09f0ddfd71000000c935755951deec4790aad73f2a0d0ea95e61d823c36e79179362117010e45868e93f897ed1215e540cf9cb2406d5b482dbaeb2b4fab36a4c8a98b8d038b283ce03d25ddb943aad335a09f7657cb3427853035390a05fb03af610b18a1316327fde7fa56c662a5a0054b6165aba9aaa5a20b88bef58738b00000000000000000000000000a8800ef5f99b97f18e255def6d0e538155ff42dd010b1433c1731d8abb68b7bad97fa62b020388e4310e0cda29d423b00d62000000005437e92140ea8de1a1c1aa04431888e62d5591b5a3bf4bf6c4532bf4dbb405fa8c641008df4bdb1ccf17"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a80)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r5) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="000500007f80e0682000000000000004010601003f27bfbaee49142b93729354d76d28e85bcb6144cee70fb2"], 0x38) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000003080)={0x0, "1aaaa8aae701d5ca00"}) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r5, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000980)=ANY=[@ANYRESDEC, @ANYRESHEX=r3, @ANYRES32=r0, @ANYRES16, @ANYBLOB="b741db2a8eb74223dd8210245f4594097879e57a675d0921913c5130be1c456c1c6f43df2bf871f6e400f9", @ANYRES32, @ANYBLOB="2e10d479262bb2f134f50e5648f6c4e7e5a91c99a5488eafdbeb33b600c1d2a9da5f098312b5fb771dd17b6c0497979a3b1367f9", @ANYRESHEX=r4, @ANYRESOCT=r6], 0x508}, 0x1, 0x0, 0x0, 0x21}, 0x20000010) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendto(r3, &(0x7f0000000540)="88be5d6641087089c4730608e3169c2f5aa0a80e6f6252bb9cdd8dd6058d6ac9a57161cbadc88ab3a50042c96bf5d7f90ce98b23e578baa86c69cf49bb138c81b9c08068197c225d338f2bac53ca583b1a4afdfce5a0922d01207ae033d6863bef66e6d753bb7383ab33da64d91fe9477e", 0x71, 0x0, &(0x7f00000005c0)=@ll={0x11, 0x3, 0x0, 0x1, 0x3f, 0x6, @local}, 0x80) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) [ 1427.596164] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:17:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) 10:17:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, 0x0, 0x0) 10:17:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x5453, 0x0) ioctl$FIONCLEX(r2, 0x5450) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000040)) 10:17:34 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd40", 0x76, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x10, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x12000, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1427.635628] loop3: detected capacity change from 0 to 135266304 10:17:34 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x8382, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) openat(r0, &(0x7f0000000040)='./file0\x00', 0x1c1400, 0x14) [ 1427.716232] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:17:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, 0x0, 0x0) 10:17:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) 10:17:34 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd", 0x7e, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000200)=""/4114, 0x1012) 10:17:34 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@private1}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000140)=0xc) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) [ 1427.788691] loop3: detected capacity change from 0 to 135266304 10:17:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r1, r0, 0x0) openat(r1, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:17:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0xfc, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x1f, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:34 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x80000001) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, 0xffffffffffffffff, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) sendto(r2, &(0x7f0000000180)="6c8ef3645a91233feb011c740eac8390630f468c0e8e1747de3f7bb7e8925592e66a52219eb35a405b61e1deb7bc4d7b973d12579539c7fd25e61499f4f7f7ab55ac5ef1b3945b4044e7679b2615aea06c6e17ef7c9ad2c30628b9c90847b4171659d957d65a777c3c794c9412bf2cda5a2c7d903a4db47e93b03b8c32efc846b793d85626db516ced977ec6839e40e85ca05e63455c5b64a035db14e1f53d5c113aa257b563d1acc5b74a13c993fc3ded47065b24d9ce006a854746b988c9de56e229ef0e61b840e2d553811f9ac838fb2c0dd59df077e154232062b7edf05a66c74d421ecf74a9d9c6a5273379b2", 0xef, 0x20000004, &(0x7f0000000280)=@llc={0x1a, 0x7, 0x6, 0xa5, 0x4, 0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x14}}, 0x80) setsockopt$inet_group_source_req(r1, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x2, @broadcast}}}, 0x108) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x80010, 0xffffffffffffffff, 0x8000000) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001e0001000000000000000000000000010000000000000000ac14140969030cbadd65accdf4a275c20e1d87bb000000000000000000000000000020000000000008000c00"/88], 0x48}}, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r6, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r7}}, 0x7) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) [ 1427.903657] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1442.330873] loop3: detected capacity change from 0 to 135266304 10:17:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd", 0x7e, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) chroot(&(0x7f0000000040)='./file0\x00') openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x389040, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) faccessat2(r0, &(0x7f0000000040)='./file0\x00', 0x8, 0x300) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/102, &(0x7f0000000140)=0x7b) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x4, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x4002}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0xd0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/msr', 0x800, 0x40) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x200}}, './file0\x00'}) 10:17:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r4, r3, 0x0) dup3(r1, r3, 0x80000) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x103001, 0x71) open(&(0x7f0000000140)='./file0\x00', 0x800, 0x14) r2 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x4000, @fd=r0, 0x7ff, 0x20, 0x3, 0x1, 0x1, {0x0, r3}}, 0x9) umount2(&(0x7f0000000040)='./file0\x00', 0xc) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd", 0x7e, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000200)={0x0, 0xea60}, 0x10) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) getdents64(r0, &(0x7f0000000140)=""/110, 0x6e) 10:17:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffff80}, 0x124, 0x5}, 0xffffffffffffffff, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0) 10:17:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00000001c0)="6276491d86731907a690d992ef90205f50cd7e929dbff5bcdd1baec088201e4a6afa5d4b3ac7e1052fe01a18a6e7156dde66da359618f9202c723fdf502949f091c5b5ef8523affa29ae0f96431ca136ad97e5b85c73707d1b0534037e8b06f6f16f2b63baa5d9fc0b2a5575503ef346719ead9df0", 0x75, 0x4040000, &(0x7f00000003c0)=@in={0x2, 0x4e21, @remote}, 0x80) pipe(&(0x7f0000000040)) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/92, &(0x7f0000000300)=0x5c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x80010, 0xffffffffffffffff, 0x8000000) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001e0001000000000000f10400fe880000000000000000000000acc5010000000000000000ac14140969030cbadd65cdf4a275c20e1d87bb000000000000000000000000000000000000000008000c0000000000"], 0x48}}, 0x0) r5 = accept4$bt_l2cap(r1, &(0x7f0000000240)={0x1f, 0x0, @fixed}, &(0x7f0000000440)=0xe, 0x80800) syz_io_uring_submit(r3, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r5, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x8010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r3, r6, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x5, 0x0, 0x0, 0x4, &(0x7f0000000140)={0x0, 0x989680}, 0x1, 0x0, 0x1}, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) [ 1442.446491] loop3: detected capacity change from 0 to 135266304 10:17:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000001d40)=0x0) syz_mount_image$ext4(&(0x7f00000007c0)='ext2\x00', &(0x7f0000000800)='./file0\x00', 0x8001, 0x8, &(0x7f0000001c80)=[{&(0x7f0000000840)="b04b88677279e374aa64", 0xa, 0x8}, {&(0x7f0000001880)="78e47a1d14befff099a32e71d450248de363118a3e6dbf7c8fb6f4595484eb1483b7b58864ab005e0868f02aff9c3e0cc8cd23c0a72ca8e1328f064dd03af2740e736c0449512f23379984157b2ecababf89c23d7dbb8d2888383b931e46a600d830526a1d8e47840882f7d01462670a94fca88eaed4f62cbf5c", 0x7a, 0x1}, {&(0x7f0000001900)="0c0bf187ecf5627ead8f32e89a3f60503e0ee878b7535b5595a33094b259c98a7d58502fb4a66a062c7b459f95ef2e77f5454868d4ed6f806af18de952b8cf43f29bd26da1fc04c5147a81080fd8914c08efea7a604b94df44fbe0f3ed161918a97d4e735c8b2b1004b1c3d5811269cc8ee66a4bff5f634f86845e67be2decb330195368e1a1c7c1b82149e83fd3ffc5d81d7fcd86f4870bbb1d5098f2bfdb04cd71ca07ca76c9ccbf64b7a3148ecb955dea638444b254d2530112dc122e938640e15e6a17d751105531a1d6b75ed2a0a54deadad387354990d29692a48ab5d6302bf006cb2626d0", 0xe8, 0x4}, {&(0x7f0000001a00)="54530dfca9d988ab1681bc5b8db12a4d2ccc4d0e0d1cf33ff433a87f3265316ce858b88001a23de14d19a7a2b389b0fe722941d291453da33009d547be78baab2743ddf71344ba9ea3233520d0366bd5c53852a8330e247bacfd6b2c3e38b3e280abc9f1835545f1de83a2fef6a10021c9d286ad9e7fa0e081d76fcd50da15903b9a9a01b55c66f941f74d7364d334bc17f4ecfaf56c08db88a6852e3ae911", 0x9f, 0x6}, {&(0x7f0000001ac0)="5d50301763f347d62e2b2e5137eab7f57329cd721dd02c039df91b4805ff2aa7ec5d522dc72aeabaa4e3d21d8e976060854f5681661e26e6c3791ceeb35b42dfc13c35cbe8d2988431d6b61ac361a9dac320d87801a6e7b6326e18e7bb6a5ec647b6ddc48c0314094f2c560adc71a7aa37901306acbbf7ccbdf21b4f8df53bb5fe26cefb8078b925da40df545d01d1", 0x8f, 0x8}, {&(0x7f0000001b80)="d17e446f883466bf8d1f6dc5db6c9df48e647892dc7aaefa865bc8c3209af349823840", 0x23, 0x8}, {&(0x7f0000001bc0)="3be3d73596dddf5ce69cee8c9c51de78b7c49f6db68b9935015160d8bafe64f2dbf57525070380aaa3", 0x29, 0x5}, {&(0x7f0000001c00)="c76d25bd3cec095402acb25d3c54cfe2db88467a336f80f3b854c8f40afe5465942364aa986b031f687a341d3cb24b038a536dc85211be431db5a29996795cb6d2fd6204f09dabfc247172b987d996c0c4d4d6dbdfcddd54d276aa35", 0x5c, 0x40}], 0x208084, &(0x7f0000001e00)={[{@journal_checksum}, {@sysvgroups}, {@nogrpid}, {@resuid={'resuid', 0x3d, r1}}, {@user_xattr}, {@nodiscard}, {@nombcache}], [{@uid_gt={'uid>', 0xee00}}, {@obj_user={'obj_user', 0x3d, '^$'}}, {@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x37, 0x66, 0x35, 0x38, 0x0, 0x66, 0x34], 0x2d, [0x66, 0x36, 0xc, 0x7c05dcd448d0b22c], 0x2d, [0x30, 0x31, 0x30, 0x34], 0x2d, [0x64, 0x33, 0x65, 0x31], 0x2d, [0x34, 0x34, 0x33, 0x32, 0x34, 0x32, 0x61, 0x37]}}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@obj_type={'obj_type', 0x3d, '-'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffffe}}, {@permit_directio}]}) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000200)={0x6, {{0x2, 0x4e20, @rand_addr=0x64010101}}, {{0x2, 0x4e20, @loopback}}}, 0x108) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) setxattr$incfs_metadata(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80), &(0x7f0000001fc0)="5eb47d459e9c4c7a5b091ab6ee2a2bae3be8aaab9a33d69a584b5ca64096b248e6be51875bc72e41f9c6f59c35a0ad7f418adc692132e2413d6b66eabc86a80218d8cec13ba9558b4a33406e919f7b33e657f0d6ce4f3dda64d234dc61efad96aa8fe91197", 0x65, 0x3) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) getdents64(r0, &(0x7f0000002040)=""/89, 0x59) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff80000001, 0x4, &(0x7f0000000640)=[{&(0x7f0000000340)="fb001588dd9a0302e7a07e2cb80c34b62937f55eb5bddd190e82300f126194c363efc913210a8f779ce1da7e89b9754bef580593d23b93c3fe4e59d30c772c39211ae47fba105b5ab163e086ab06b34c41ec58e61b728b7902a641a102c7d97e64d373b54da98ceeaa3ec1e137abfdb58cff09df2175afa50a93090baf793a55b01bac3c41067eab7b8304e0daeac81a8569bca671c0415e0d46fef54b770fec47d28daf7f9f40ed567b27687c565c68f5d6d6b7b61f4a3e2c41019766fc10cac99c902bed04126d7a63b94d62758c2862da9c0ffd752971493ab26e9327ccfd55eaac807f061c1cf755ed3f731581465bae3b428bf82c993e30f7c95beb", 0xfe, 0x3}, {&(0x7f0000000440)="4916262b2cb08e8b827b092a3115f1153f56936e984f7bdd3ffe9432777cffbe4b4038b9448dca89cb4e80a62395de7f10d8186ecdd04a2705577850df6196ad3ac784f1599cba34ecfa66a8ca39b93a8c6efe5d249253044e863a3f2966639d09189b3ea7648779f5199c3ff62e241d4badde2f61f720be620c8701c1a20f045fb2c438806e00e6018856c6297413463fd883435980902631949ddc", 0x9c, 0x6}, {&(0x7f0000000500)="1a4919a9c9af647af7e35a02e966dfdda1171cd0dff3b2bcef8470028abeb30abedb72bf1611cd52720c866ece4b1d70796d5f86e35a8ab095457adab7b4745a16cac760f4d762faf89f561500b63869e0e9e2620336cd3e304081fcbe655e56d44e30c44b97210abf624e77eecc36eaa8dc4ef14a2d4d0d07e6dc4865122b5e3eda", 0x82, 0x7ff}, {&(0x7f00000005c0)="f10eb579913a3aae6d6f3d0a3ace2b8aee1c2862cdbbe0523c3adee21a5261880de882b055a119e102e490ebf567bd5217543d8e559edb514b603905b07135871b217a22261d6fb677e90eb97c8b0809502fadc34ac00adf81d933adfce00754744b9822b11391547a78133baa", 0x6d, 0x400}], 0x900084, &(0x7f00000006c0)=ANY=[@ANYBLOB='grpid,errors=remount-ro,user_xattr,init_itable=0x0000000000000000,mblk_io_submit,seclabel,gsuuid=9346688b-b3f3-5\fWd-957\n-61ebU0ca,smackfstransmute=9p\x00,pcr=00000000000000000018,dont_appraise,subj_role=,\x00']) 10:17:49 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a", 0x82, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1442.535293] loop2: detected capacity change from 0 to 32768 10:17:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x106c) 10:17:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, 0x0, 0x0) [ 1442.549999] loop3: detected capacity change from 0 to 135266304 [ 1442.561093] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:17:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) dup2(r1, r0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x7}}, './file0\x00'}) write$binfmt_elf64(r5, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x2a, 0x46, 0x81, 0x7c, 0x520cf3d, 0x3, 0x3, 0xc9, 0x122, 0x40, 0x285, 0x0, 0x3, 0x38, 0x1, 0x2, 0x1, 0x1}, [{0x60000000, 0xff, 0xff, 0x7fff, 0x2, 0x3, 0x10000, 0x3f}, {0x0, 0x4, 0x6, 0x3, 0x1ff, 0x7fffffff, 0xc22, 0x6}], "693e854c65d3391e8de2a9b651a6c416cb247505a076ddc5d8df16c24afb64c75730aa567742c065aa39ed43bb7532d9d4582d15245aeb0de3d4e1d795ec3001128809c94e7f9cd0a5189a8977f1d32f152de389865259bb990c8e1e8c1a99ad4e668c72a7088e6babbfbbd813e8fe7a6f3207f80b7865f0a81d5b55c3e1be891a7e3df20fc3999fa7797d2535bb6771f74b1dcec35032589705fd1f366e322181c3a93d135fbd9ce88d56478fde43cc8e7a97081c27513930f8ecf2d1eb5a8f5a711ee3f4c2cf258ed10c72c3a6f872cc708c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa83) openat(r0, &(0x7f00000001c0)='./file2\x00', 0x2100, 0x24) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r6, &(0x7f0000000100)=0xfffffffffffff674, r7, 0x0, 0x0, 0x0) accept4$packet(r7, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14, 0x80400) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:17:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r3, r4, 0x800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, r4}}, './file0\x00'}) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1442.628870] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1442.655767] loop2: detected capacity change from 0 to 135266304 10:18:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) close(r0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffb, 0x7ff}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, 0x0, 0x0) 10:18:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x5453, 0x0) ioctl$FIONCLEX(r1, 0x5450) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000180)={0x3, 0x1, 0xa, 0xf, 0xc3, &(0x7f0000001880)}) io_submit(r3, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) recvmmsg$unix(r2, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x42, 0x20) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r4, 0x5, 0x5, 0x5}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) 10:18:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) accept(r1, &(0x7f0000000200)=@sco={0x1f, @fixed}, &(0x7f0000000140)=0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x80, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:18:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) 10:18:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) recvmmsg$unix(r0, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r3, 0x0, r2, 0x2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r3) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x90001, 0x10) 10:18:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a", 0x82, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1456.563881] loop3: detected capacity change from 0 to 135266304 10:18:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, 0x0, 0x0) 10:18:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x58701, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f00000001c0)={0x2d06, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e20, @multicast2}}}, 0x108) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0/file0\x00'}) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r3, r4, 0x800) mount$9p_tcp(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x104006, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@version_9p2000}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@debug={'debug', 0x3d, 0xb3e9d1d}}, {@loose}, {@fscache}, {@cache_fscache}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x31, 0x30, 0x38, 0x66, 0x36, 0x61, 0x63], 0x2d, [0x66, 0x65, 0x32, 0x30], 0x2d, [0x62, 0x52, 0x30, 0x36], 0x2d, [0x39, 0x63, 0x33, 0x64], 0x2d, [0x38, 0xa9, 0x37, 0x65, 0x37, 0x63, 0x61, 0x36]}}}, {@uid_gt={'uid>', r3}}, {@fsmagic={'fsmagic', 0x3d, 0x81}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000140)={'mangle\x00', 0x0, [0x5, 0x9, 0x1, 0x1, 0x3]}, &(0x7f0000000040)=0x54) 10:18:03 executing program 5: setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000140)="f7cea003e5f6147cf5302851952e9f9d83fcf5561bded334a06b0ac25ee4272e14e29e351bfe2e71834bad75f5eb230006d78aba69d2c72473e5a74c789ffe0779900a40afc9ec68a1fdf63ea19a5a999204c11fc711d3e7b0e6967165709411f11d7a8cd65edb1018b1493ea2e5c13b79f6bda1e604fd92976f99ad374f843d965e70a4275cbb96c08884bd5da6bd4b6c0bb5b8e9519a85318ac2bcf1bf728aa666c51385e9408621ac12d5846edcab7b491b865ad9bbd7d22f4c0e85ac598b", 0xc0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x2, &(0x7f0000000300)=[{&(0x7f0000000200)="cac9b2081054345de62d3f7992cbce1856e31a3851897c60e2ddf21e6c0cfd8befa77482ec7a46c522061329932e535ebaf76bab3f9b", 0x36, 0x8}, {&(0x7f0000000240)="3891e179c5059cbfc656b2267dbaa1ecaebad5a56bbeca9f57d2a65f0a4b5675e0ad2fe436e55ae1cbd9b26bfd599f060be74feaa979647b90bd6222ff7020880dea2c335c9dad2cfc5f8b823c18cd9d88deea38fda8a30d3b51da28919af202fe96845cff1ad1d050eca36fced54cbfc0603a906d3cc261781f993c203526e194d909a82e27c8505bbfd37c624bf81e5b1955694ca1e5a25b99dd8a139e6843f4cf57fc187dae6a2e48e1313e451cfe650b5cd6bef688ba82a64aee", 0xbc, 0x1}], 0x80, &(0x7f0000000340)={[{}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@init_itable}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10000}}, {@dax}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@dioread_lock}, {@grpquota}, {@dioread_nolock}, {@resgid={'resgid', 0x3d, 0xee01}}], [{@obj_type={'obj_type', 0x3d, '/&'}}, {@uid_lt={'uid<', 0xee01}}, {@fsmagic={'fsmagic', 0x3d, 0x74ee}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_lt={'fowner<', 0xee01}}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@pcr={'pcr', 0x3d, 0x15}}, {@smackfsroot={'smackfsroot', 0x3d, '9p\x00'}}]}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000600)='macvtap0\x00', 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) setsockopt$inet_int(r2, 0x0, 0x5, &(0x7f00000005c0)=0x8, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) utime(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x8, 0x2}) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:18:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r4, &(0x7f0000000100)=0xfffffffffffff674, r5, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {r5}}, './file0\x00'}) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:03 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a", 0x82, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1456.691944] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1456.731811] loop3: detected capacity change from 0 to 135266304 [ 1456.770494] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 10:18:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80, 0x1}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x1200, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x101000, 0xa0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:18:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @dev={0xac, 0x14, 0x14, 0xf}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 1) 10:18:17 executing program 1: ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000240)='./file1\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) openat2(r2, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x204500, 0x62, 0x4}, 0x18) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000007}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x5, 0x81, 0x7, 0x0, 0xfffffffffffffffc, 0x83800, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x9, 0x7, 0x100, 0x4, 0xfffffffffffffeff, 0x101, 0x3, 0x0, 0x2, 0x0, 0x10001}, 0xffffffffffffffff, 0xf, r0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000001e00)=""/4096, 0x1000) 10:18:17 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a2684", 0x84, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:17 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:18:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x58701, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f00000001c0)={0x2d06, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e20, @multicast2}}}, 0x108) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r1, {0xee01, 0xee01}}, './file0/file0\x00'}) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r3, r4, 0x800) mount$9p_tcp(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x104006, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@version_9p2000}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@debug={'debug', 0x3d, 0xb3e9d1d}}, {@loose}, {@fscache}, {@cache_fscache}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x31, 0x30, 0x38, 0x66, 0x36, 0x61, 0x63], 0x2d, [0x66, 0x65, 0x32, 0x30], 0x2d, [0x62, 0x52, 0x30, 0x36], 0x2d, [0x39, 0x63, 0x33, 0x64], 0x2d, [0x38, 0xa9, 0x37, 0x65, 0x37, 0x63, 0x61, 0x36]}}}, {@uid_gt={'uid>', r3}}, {@fsmagic={'fsmagic', 0x3d, 0x81}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) r5 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000140)={'mangle\x00', 0x0, [0x5, 0x9, 0x1, 0x1, 0x3]}, &(0x7f0000000040)=0x54) 10:18:17 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="e5b2ed4194129e19f74ee1123ff2cfb46d2379ee7a0f0013f2d6836c771ab4f82a765dfd0f94406f7b21054565f5e92fe551d53923b20421e1c5d90014ec66949a2503a43c4322203e8497207071cc00b1baf8ae5d46ea5b03a77f118bbe26ec86b5a0045ad6ad49ff203fa89a318bab9f44176a508f855ff5ae4a850ea1a9c41f4290b60b452d7c469f203c5a731eba16bdc1e72fe42f89b397b1249159368c69e449bffa4564d95bab7f92c3900d1c7ed992224e7c74ef4f1236fd0dc1b34322b2e46d280ba58559a70c", 0xcb}], 0x1, &(0x7f0000000300)=[{0x108, 0x0, 0x7a78, "9db9c1c20dbe9f9b5cc7f8bff55fcc34e8db368a1088b12d35c0b4c0e0a1ef4d82dd8ff6e7c891da4cc17483dbaab69b25a852b107fd808aca72fcd6169ff1ee4d90ccf74507167ced11935d120da753bd63bd23c7ffc31dbe6fcfd1dcb7e467bd848f25501b78b6cefcbcad4f098d2a5cd4c0e3f7e61e210055998b6ddf6a3a7c094f56134f233ba32c9de7748056e93fd39f582acbd29e6a66338407f6a9f92a407c7a4137a5535a376fd0ed721252e84f93b749b4e84129e0ef14155bbd6cb6b30f10de832d99bc856b9ea57635c588af6055c4faf03ed8d8b257a3a2d98b2ca60b7c5f89dea3cba197e311c810c6b81d3e"}, {0xb0, 0x111, 0x1, "85ad4b0a1171d978f4a0826d503c54c5b24820c94744b3ed60ace675457b2fbc9ca8167ce252fbf49ea8da436a185b4b9f138e726197ad1598b80b9e585617f36621e8442fcbd37c716c328d71e77e4f69e5d70ab0933e406b833044c7d00ccf6529a8d7db77ec35ee299b8294a6f75cafa90494926de896a25a50fe1e7cc9b6be31d7f18b9fa595e427b3349e6e90d94ef2a92c4bbebd7a8d3d9e4aa3"}, {0x98, 0x1, 0x1ff, "c9e132abd5aea60d3b0eef146f62cb1771c9065f585195c772263f4fe32ddc4d5924844c012d99ad7b2dde82b3c0cad7318adfa7e16f462488c083af9be70b65ff4b148621b178e34b73bdb752aac176f42e3350018d925b4e1e6762e25d1145b9e8f09157d032bec207bf29cc889639dbcf679ddaefec77d6da7900d4ad97361fa62cd91ed6da3c"}, {0x108, 0x1, 0x3, "57b859676e829c214f26a4b95ff906e01744ddafbeffb15e71a0606a0fe8c88a9f64bdc7bf925c8391cc73a0fcdf07dff73c86c66c9b9a11830d668775e61c5f5c375487994bfd2ce2248855b0287da71273a258746c59577f433ca6a2156ff12631758530cb3d403af94204c490092bafde01529d654caa31c21793c992a58750027cb2658a75f9937f3ac07d44ce3fc6c20ca85a23f1cefaff32da14fb6f5a7a1dd86e0d03e7f7372dd9c70fed12d4b67c8e56ef9c0ec8932307c5b3dd0369b1470b29a821dd76b3393194e267ca4e66a220eeffa4ad366dfb192b11fa87e3c9dfa66c2bf02a78bbce39ab0bc4d29754d33c7f66223c"}, {0x90, 0x113, 0x3, "de31c279b3c75b12b2075e5ab32a8c98ee9b6a2f7e49543f8ef65abb3da36abaa0d77b356b4bbc70e37ad85eaf6b36dbdbb9837907b326cad57f6101a9c67c25726c436214b217f4d6095a261ec160c97493a026adda708d79d19eed69331b00688a95bf95559e864a17b9170f48fc630db0c5ee16a347f1cd38836f48c1"}], 0x3e8}, 0x4001) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1471.238457] loop3: detected capacity change from 0 to 135266304 [ 1471.244238] FAULT_INJECTION: forcing a failure. [ 1471.244238] name failslab, interval 1, probability 0, space 0, times 0 [ 1471.245680] CPU: 1 PID: 7989 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1471.246532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1471.247578] Call Trace: [ 1471.247919] dump_stack+0x107/0x167 [ 1471.248391] should_fail.cold+0x5/0xa [ 1471.248880] ? __d_alloc+0x2a/0x990 [ 1471.249345] should_failslab+0x5/0x20 [ 1471.249823] kmem_cache_alloc+0x5b/0x310 [ 1471.250332] ? mark_lock+0xf5/0x2df0 [ 1471.250808] __d_alloc+0x2a/0x990 [ 1471.251256] ? lock_acquire+0x197/0x470 [ 1471.251810] d_alloc_parallel+0x111/0x1bc0 [ 1471.252377] ? lock_downgrade+0x6d0/0x6d0 [ 1471.252933] ? find_held_lock+0x2c/0x110 [ 1471.253482] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1471.254031] ? __d_lookup+0x3bf/0x760 [ 1471.254536] ? lockdep_init_map_type+0x2c7/0x780 10:18:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 1) [ 1471.255162] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 10:18:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1471.259871] ? lockdep_init_map_type+0x2c7/0x780 [ 1471.267988] proc_fill_cache+0x2f6/0x4a0 [ 1471.268518] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1471.269286] ? pid_update_inode+0xa0/0xa0 [ 1471.275659] ? pointer+0xa80/0xa80 [ 1471.276125] ? snprintf+0xbb/0x100 [ 1471.276597] proc_pid_readdir+0x3d3/0x830 [ 1471.277138] ? proc_pid_lookup+0x460/0x460 [ 1471.277675] ? down_read+0x191/0x430 [ 1471.278152] ? inode_security+0x107/0x140 [ 1471.278696] proc_root_readdir+0xa0/0xd0 10:18:18 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1471.279222] iterate_dir+0x584/0x710 [ 1471.279717] __x64_sys_getdents64+0x13a/0x2c0 [ 1471.280293] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1471.283944] ? fput_many+0x2f/0x1a0 [ 1471.284412] ? fillonedir+0x4b0/0x4b0 [ 1471.284904] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1471.285585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1471.286249] do_syscall_64+0x33/0x40 [ 1471.286727] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1471.287384] RIP: 0033:0x7faf66c84b19 [ 1471.287867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1471.290230] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1471.291208] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1471.292123] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1471.293045] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1471.293957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1471.294867] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:18:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 2) 10:18:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000280)) r1 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) fcntl$setsig(r1, 0xa, 0x3f) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000140)={0x9, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e20, @remote}}}, 0x108) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6tnl0\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x4, 0x2, 0x8, 0xfff, 0x1, @loopback, @dev={0xfe, 0x80, '\x00', 0x26}, 0x728, 0x80, 0x1, 0x4}}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x34, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@GTPA_LINK={0x8}, @GTPA_LINK={0x8, 0x1, r3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x64010101}, @GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x8d0}, 0x20000000) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:18:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000000040)="7d9eea9df6dcf2edbbed62126ae61169f2c150d553b0b3de8ad6f237937c5cfc12a5e7a110915f4ddd7e6e4ef516ce6a7bc79361ef0f", 0x36}, {&(0x7f00000001c0)="26c290199cacae54ec19e12b0c6d6816db26b6774367e0f95bdda285044b3d7633b8215d864299c7d7373b54908348faeef7c1a6a33b3220c6f5fc514a77dddf73c7c4d800adeffa220219b626186fa8c258e44ae17e3d46bf83f5c789efef8208508d0a51eb32fdac6f86371519a5bff02d465a55e13ee2495b611b46e2d9c480531d8c933d188e04fa9fef99e57913f1a1b639a84a0f547fe121a23b139cd1f2fa73a6efd578b199d8027cd517e061a305b509a975084b1342b0e7a9eb2c91642d27c317aa1ae3d8fb865a", 0xcc}, {&(0x7f00000002c0)="2053982b596c178b852b02e7ccfd7509f44d2b283a84d618ef07b87fb500886e7fe7fb639f1075915535152a7e4401533baba6315457dc4b178158cd3350904a1f527b4000727e6b5b9747822b2400b15adc2c018c2ca31ceb4f0b342f065e164c5e23c5b45bb3b4b99666012a4c075a0cb70122", 0x74}, {&(0x7f0000000340)="729e58b694738c82140daae2e2924c319e8872d6b25fff0723ea1423e64091e25058acdf5a43a02a1c98d976fca5159d6b7fa5dcda6f22a54b5a8617a29a7ed3b7275302bce13259b7009ece610da9da87d10d95eb358ed37a46ae057b0b11cb69dbfb1fb867d79e78", 0x69}, {&(0x7f00000003c0)="d4d217ff3dce99a141e85b854d9b96744ffcf631b6e1bfcc73fdc8a6b2040e6cac53", 0x22}, {&(0x7f0000000400)="28544ed1429ae78c81d6285f61eea88710286db8dd224ae8339912be1a9b3f957ed92eb10d05a37508f1c72dd569f09764b3b129eaaf4f1472afc7900781fd1931ad4a863cb1f1a1aca7f4ca95cca9fb0a45353d5e1d11bb9ebcee97e79d9595de3c255ee5e2e5e9ed3f95b6411057c659a13776938a99e4d97b06f7380df5e53931baa6a37d3f4f3bd03afb7e3efb868aa15301bfcc681dfe11cb9b2aa871dbac354f645e8edea15050fad382e8ae6542b7", 0xb2}, {&(0x7f00000004c0)="f26b9f3a5148be46d6b0f47d1d4f5306580f382ac763a661bb98d4aad4274b124efd7c3d9e92505d8a4e12295ef1e64257c72080a5132d26be49fde93d1fd8560101443dc8dccea4dd3414003c20e7badfa26a32572cf840905ea9b623f33e6a2814fa7d228c6108abfd", 0x6a}, {&(0x7f0000000540)="4910f3f0bf1bda2d0db9adef14f02e56dbab8724e505180ea6d1d64a723caba66398d3d6dbe1799fd68ba7b29ce1f12c34a474af2611f544d34e36ac582f260d2d023bd4260509c9e4291cbdb5859d97bcda5e6d5165d0e8a334c7b7a2acfb6fcbb5bb94ddd48f7fac5a4f15590d6792ffedf634c75fa1b6103b6dfdaa561ed2247e26bf7ec2f92a1257c7cec45d2ab76a7e6abda42aff7315af2e359c68fba8b80b7d714d78573c748649b0494f4d34b1c3e0896d1de30daaf5f2925921468086864b1971e7906185d3e13fdba7be08b934876c735ffaf7a1b943c42ac9a2c6178ffbfc4d5bcb556b764c78955c6702f9", 0xf1}], 0x9, 0x0, 0x0, 0x8000}, 0x800) 10:18:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a2684", 0x84, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1471.400113] FAULT_INJECTION: forcing a failure. [ 1471.400113] name failslab, interval 1, probability 0, space 0, times 0 [ 1471.401890] CPU: 0 PID: 7996 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1471.402753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1471.403809] Call Trace: [ 1471.404157] dump_stack+0x107/0x167 [ 1471.404623] should_fail.cold+0x5/0xa [ 1471.405113] ? __d_alloc+0x2a/0x990 [ 1471.405612] should_failslab+0x5/0x20 [ 1471.406093] kmem_cache_alloc+0x5b/0x310 [ 1471.406610] ? mark_lock+0xf5/0x2df0 [ 1471.407085] __d_alloc+0x2a/0x990 [ 1471.407555] ? lock_acquire+0x197/0x470 [ 1471.408063] d_alloc_parallel+0x111/0x1bc0 [ 1471.408604] ? lock_downgrade+0x6d0/0x6d0 [ 1471.409131] ? find_held_lock+0x2c/0x110 [ 1471.409657] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1471.410179] ? __d_lookup+0x3bf/0x760 [ 1471.410676] ? lockdep_init_map_type+0x2c7/0x780 [ 1471.411280] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1471.411969] ? lockdep_init_map_type+0x2c7/0x780 [ 1471.412581] proc_fill_cache+0x2f6/0x4a0 [ 1471.413091] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1471.413856] ? pid_update_inode+0xa0/0xa0 [ 1471.414386] ? pointer+0xa80/0xa80 [ 1471.414849] ? snprintf+0xbb/0x100 [ 1471.415320] proc_pid_readdir+0x3d3/0x830 [ 1471.415695] FAULT_INJECTION: forcing a failure. [ 1471.415695] name failslab, interval 1, probability 0, space 0, times 0 [ 1471.415869] ? proc_pid_lookup+0x460/0x460 [ 1471.417805] ? down_read+0x191/0x430 [ 1471.418280] ? inode_security+0x107/0x140 [ 1471.418826] proc_root_readdir+0xa0/0xd0 [ 1471.419348] iterate_dir+0x584/0x710 [ 1471.419840] __x64_sys_getdents64+0x13a/0x2c0 [ 1471.420409] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1471.420994] ? fput_many+0x2f/0x1a0 [ 1471.421456] ? fillonedir+0x4b0/0x4b0 [ 1471.421949] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1471.422615] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1471.423273] do_syscall_64+0x33/0x40 [ 1471.423765] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1471.424412] RIP: 0033:0x7f33f1bc1b19 [ 1471.424893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1471.427193] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1471.428173] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1471.429070] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1471.429969] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1471.430861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1471.431782] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1471.432702] CPU: 1 PID: 8004 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1471.432824] hpet: Lost 1 RTC interrupts [ 1471.444219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1471.444228] Call Trace: [ 1471.445613] loop3: detected capacity change from 0 to 135266304 [ 1471.455689] dump_stack+0x107/0x167 [ 1471.455704] should_fail.cold+0x5/0xa [ 1471.455720] ? create_object.isra.0+0x3a/0xa20 [ 1471.455735] should_failslab+0x5/0x20 [ 1471.455748] kmem_cache_alloc+0x5b/0x310 [ 1471.455765] create_object.isra.0+0x3a/0xa20 [ 1471.455777] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1471.455794] kmem_cache_alloc+0x159/0x310 [ 1471.455805] ? mark_lock+0xf5/0x2df0 [ 1471.455822] __d_alloc+0x2a/0x990 [ 1471.455839] ? lock_acquire+0x197/0x470 [ 1471.462524] d_alloc_parallel+0x111/0x1bc0 [ 1471.463073] ? lock_downgrade+0x6d0/0x6d0 [ 1471.463614] ? find_held_lock+0x2c/0x110 [ 1471.464145] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1471.464674] ? __d_lookup+0x3bf/0x760 [ 1471.465163] ? lockdep_init_map_type+0x2c7/0x780 [ 1471.465780] ? lockdep_init_map_type+0x2c7/0x780 [ 1471.466395] proc_fill_cache+0x2f6/0x4a0 [ 1471.466915] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1471.467701] ? pid_update_inode+0xa0/0xa0 [ 1471.471809] ? pointer+0xa80/0xa80 [ 1471.472274] ? snprintf+0xbb/0x100 [ 1471.472749] proc_pid_readdir+0x3d3/0x830 [ 1471.473286] ? proc_pid_lookup+0x460/0x460 [ 1471.473825] ? down_read+0x191/0x430 [ 1471.474300] ? inode_security+0x107/0x140 [ 1471.474837] proc_root_readdir+0xa0/0xd0 [ 1471.475354] iterate_dir+0x584/0x710 [ 1471.475861] __x64_sys_getdents64+0x13a/0x2c0 [ 1471.476435] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1471.477015] ? fput_many+0x2f/0x1a0 [ 1471.477482] ? fillonedir+0x4b0/0x4b0 [ 1471.477971] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1471.478644] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1471.479304] do_syscall_64+0x33/0x40 [ 1471.479796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1471.480450] RIP: 0033:0x7faf66c84b19 [ 1471.480927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1471.483266] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1471.488184] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1471.489096] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1471.490003] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1471.490910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1471.491832] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:18:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x2bf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, r1, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) openat$cgroup_ro(r2, &(0x7f0000000140)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) 10:18:18 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a2684", 0x84, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x840, 0xb0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f00000016c0)={0xfffffffb, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x0, @empty}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 3) [ 1471.673257] loop3: detected capacity change from 0 to 135266304 [ 1471.676094] FAULT_INJECTION: forcing a failure. [ 1471.676094] name failslab, interval 1, probability 0, space 0, times 0 [ 1471.677767] CPU: 1 PID: 8027 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1471.678639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1471.679721] Call Trace: [ 1471.680067] dump_stack+0x107/0x167 [ 1471.680536] should_fail.cold+0x5/0xa [ 1471.681029] ? proc_alloc_inode+0x18/0x200 [ 1471.681574] should_failslab+0x5/0x20 [ 1471.682066] kmem_cache_alloc+0x5b/0x310 [ 1471.682587] ? proc_free_inode+0x20/0x20 [ 1471.683114] proc_alloc_inode+0x18/0x200 [ 1471.683656] ? proc_free_inode+0x20/0x20 [ 1471.684179] alloc_inode+0x63/0x240 [ 1471.684647] new_inode+0x23/0x250 [ 1471.685099] proc_pid_make_inode+0x22/0x220 [ 1471.685653] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1471.686398] proc_pid_instantiate+0x50/0x1e0 [ 1471.695771] proc_fill_cache+0x373/0x4a0 [ 1471.696292] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1471.697062] ? pid_update_inode+0xa0/0xa0 [ 1471.697594] ? pointer+0xa80/0xa80 [ 1471.698064] ? snprintf+0xbb/0x100 [ 1471.698536] proc_pid_readdir+0x3d3/0x830 [ 1471.699074] ? proc_pid_lookup+0x460/0x460 [ 1471.699629] ? down_read+0x191/0x430 [ 1471.700112] ? inode_security+0x107/0x140 [ 1471.700650] proc_root_readdir+0xa0/0xd0 [ 1471.701173] iterate_dir+0x584/0x710 [ 1471.701656] __x64_sys_getdents64+0x13a/0x2c0 [ 1471.702232] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1471.708005] ? fput_many+0x2f/0x1a0 [ 1471.708473] ? fillonedir+0x4b0/0x4b0 [ 1471.708973] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1471.709649] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1471.710313] do_syscall_64+0x33/0x40 [ 1471.710789] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1471.711460] RIP: 0033:0x7faf66c84b19 [ 1471.711942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1471.714296] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1471.715271] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1471.716197] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1471.717112] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1471.723596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1471.724515] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:18:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet(0xa, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x48de, 0x4) sendto(r0, &(0x7f0000000000)="d4f8dfaa394996add3afd1da13fac83014b8e5c45afa1a1f3ed44d2f6eaf6b5f9203bf69ab683862", 0x28, 0x0, &(0x7f0000000140)=@nl=@unspec={0x0, 0xff00, 0x0, 0xf5ffffff}, 0x80) recvmmsg(r0, &(0x7f0000002b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x5da, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="3f4dbf3207dba26e8d92c13f921ed95ea8dba80575e82a3ecc3b0c8a056364f19687bbecaf0313864d8a23deae9183931df52e4cc62e2a7457d1ff8878ebdafd5b062a588ea2138eab5dbc8a44bddfe9de2af96f44ec18c0bd8d3a9bcc", 0x5d, 0xffffffffffffffff}, {&(0x7f0000000200)="9148b727e7ab9de95408a8dae0ae6ff6cd9e78bf54684f2897edd157a27648f55923aabce81e1a469474a2e6f63f8072225f57b3bef2fb8ed5392d4bf7a86b3d7fa8706354c57abee6ad7f0630b010f112103478dd376f61ed64e9b5497919341c5e88f88368e447308650eb8cc49cfbd5d05d106b36ebf11e7af2300a20300dabde2c4734c34307939a10d8063854f22a0d7947b2ddc8ba973cf2d9822ae88888d137944fd6ebdb85b20ad6a4e3887e4e89a75e5532d47c70a6feea79c170e7470a42805ce6f761b8f6db2efdc979aa02215b19ba43f0fc18", 0xd9, 0x7}], 0x1001804, &(0x7f0000000340)={[{@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x78, 0x37, 0x78, 0x2d]}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@huge_within_size}], [{@smackfsdef={'smackfsdef', 0x3d, '/\'^'}}, {@obj_user={'obj_user', 0x3d, '*{'}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:18:33 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0x146) 10:18:33 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477", 0x85, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 4) 10:18:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 2) 10:18:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) r1 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x1, 0x9, &(0x7f0000001980)=[{&(0x7f0000000180)="eb9cf5ba9358321a10bb3d64890523afb5e8e66d4ced9a2baf594ebc303b2d075bacaae2797e6040fbacb3ed00b841b3132d1502fa656b765a469efb6aec1961572f6207dc31ea204fa02b76774480fbe5492bd2adae1436e2e176ce7454a38dcba2cf42ea7c2e030daddf687307663768e5974701b78d274bf7602432506e470a69fb9b06d58f65ed636ee259c460b7ff313ec5739c9f7ac850f66b52033cd77e5df2d38fe0b5f6fc3df7e7955d9c7a6ed9d7be352bb471cc88028f2bdc135df93d46b3f69ec7170987ed67b1723b8ab2be9461b1ce3b7763fb", 0xda}, {&(0x7f0000000340)="ffe4343af66c3dd5dfc93b2748f58aa1f7e8ed9116ecd6b1a34fde3318d3b771234896b2bc8d025c4eeee1cc28a146c2e6bc608248abfb2547459f69c162c49c6fca160f159407e2c9322f81fdbac2b21ed928ae4021914c753f2621b9febd9366b3f7226c22620fa7d14708587fed2c06292fb46728553f9ff2b2e59ea0df3a718f2c6e1ca4a64ec5a16d9c15588984df1ec57213cdc431", 0x98, 0x7}, {&(0x7f0000000400)="163b1937b20b7aec0b73267407d0868a4639da7fe6b34a8450106475b9e47fca8ac656b2ab1ae91719c65770fc5d44eba16bc694d0861f579057d689ec567c648b41c088a5cc9d19e26099f3ada668eabbd44e5f643fdd69fdcbc3665e6f13218eb0502bd04a7c72c7e83893f6ef865a915495a4bdbeb4cae4932b3646dc01dfdc", 0x81, 0x22ff7b09}, {&(0x7f00000004c0)="44f92c59a1b1a96942c592117138f96a2be7affb1f7dbe8e8fce5630a77ed3e060ffacc4b84a07494686354fe685c342c9bece3a6ad90dffe4b58aa5493992086aca16256deafbb468e3fe45c4e80ffd0248336b8a22c1bd88e68239107c037cb8084e56c820dfdb1a094854ff9d82d1a9ca1cb3362fc19843d353c971e59a4b1ba71b72af2b3e149d1e82d432aa6e90602132deb9a940b7b0d1d399257c87dbb939df6414b6980361c051cbf88f95cbc59feb0f8e70adb010ff892c0470c04a91538ee5492388c13f33f3e9104385cc441cee7354b76f5434f4a5cacd6cad1d2bbf271352cd76c4c86fc544c2bd538b9633c705b8", 0xf5}, {&(0x7f00000005c0)="07dc7bc093e35770b8b4fab2462bc69f6697b35ad158562596e865a00809dd9c995ea0abdc667261b9b3de705dca46ba2ba41652c2933445c49c7e4240b2c30a2fafc0eb8bbf486f3253c69e16d08b3b499817c5203d828848b580ae71f6e55b93b3cadb26a38ef5514682430533e2a781561c6d3d1bcdeac59236eef1ae112b1e32cd03ce648dcfd10f5770d864659f3fb10cbb051965afd862236081c080917c04f176e9e00f5ee4e3d9f51fd92612", 0xb0, 0xffffffffffff7840}, {&(0x7f0000000680)="200666a09199fd", 0x7, 0x5}, {&(0x7f00000006c0)="351fc3dec4bbda50d325b2efd4a420635b3bcdba1ffe5c36b88d9dcaa634ac2f3655077f78f5db31e16701aa89b2daa87f21dfb186de0b192e4fe9da1e68707e17f8aca4c94607a900008a61003a4312fae547cae0e573db685cc5fe1af08700110adfafbbd93d0da264370d4148eec5995a403b00f57ca89d5ae607c78d9f25abaf6e3ef3eaae205f6e8e5cbf4d972339f21ec373030856938d1df5c3d500"/172, 0xac}, {&(0x7f0000000780)="5c638a2654377d6ceadf8535cddc7d7426", 0x11, 0x6}, {&(0x7f0000001880)="9d9ef8a8de0f3b256209aed8d1b976851b3fd299d4178b447f05457a8b01f4bf1c4b9981a5a161dba112378f3d95e775c8b0e23ab57ffd11695a663d136ba7fdfdd05e9fb04579f316a736a1749befcdce6184d05f77f85a508f52a9cbc719aecfa85fdeede6e727db199e71630c9ba1e00f9e6973ace1e1307d7e6ea1e5f3efd4eaacd91d2f28f735d1ceb6c728f7baa5f491063a3b7cd371ce55ec86cccf7deead98c969397cbe85af40471579f0bd4103dace88cea71e801e00cbf6efce4009", 0xc1, 0x1000}], 0x4, &(0x7f0000002080)=ANY=[@ANYBLOB="6e66732c64656275672c756e695f786c6174653d302c756e695f786c6174653d302c7375626a5f757365252d2c2e2c6d6561737572652c646f6e745f61707072616973652c66756e633d504154485f434845434b2c66756e633d4649524d574152455f434845434b2c000000007f11f8e2b396732d5845bf29325f02e31dea5c368193f1c8f45f74f875cd6a6964c1642ea2fb273b5d8321372d44ef92061b2dcbd6fa15e0bb5d8d78863699e1eb8491a7d69d45b83e6461c47f500c22b26067cef762fdcf0ca179aeb148b2dafe3efab9e68a98460858e369b50133e6e1152ae4ec160bc140ff9a61b541059d393464f6701d364cfbf3dbf031d7702f9ec8f15e8d756982b43aec8bb002b1bdefb936474759143b6a0c374c33cc1c071ff8ccf08415bfcba96a8247903618c4c567b9a80cdafe3b1cee547e46abae57eb8eece51f1b36950af82af3a8a0c14b8bfebab9833c0bce3884c58699e746f99d9923685cfef6c16cde9b783e163c287da78c2994111d209bc7926a6caf236814b3af3301b4575f2b107affebbad7d6f7373f7672d016b7369ea678a3e8bf55e6fd469c90d6c0e4f843399eccb9ec25db620157fdc6ccf0dfb333ba4bba946ac393f037183abf07a3d53183197b4d0eec41b1b81718c8de200fe58312c592bdc83f3e0bfd29e490dbe58c4e670da86fa28927ec2b416fb444ce2948aaa0dda552dc01d73cb5b00554c55a66430c094e929549cb4df3faedc77a149ff157db4b12109592e85e5decedf743858699a5c8ed359c2253ec65083ebe502dc49769e1f4d38b97d7a7ecfa89f4993b3d5693cabc7688b2e5bd09f56149b5e47aadc7bb3dd30119eb0c6b8edf7d9f919afc9297f8b0ac844bcbe41f7b56a09bed39551a1113"]) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r3, &(0x7f0000000100)=0xfffffffffffff674, r4, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') perf_event_open(&(0x7f0000001c00)={0x0, 0x80, 0xff, 0x2, 0x0, 0x8, 0x0, 0xfff, 0x40004, 0xd, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000001bc0), 0x1}, 0x600, 0x1000, 0x8, 0x8, 0x9, 0x10001, 0x8, 0x0, 0x98d8, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) dup3(r6, r5, 0x0) openat(r6, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) openat2(r1, &(0x7f0000001c80)='./file1\x00', &(0x7f0000001cc0)={0x31b803, 0x9, 0x10}, 0x18) getdents64(r6, &(0x7f0000001ac0)=""/217, 0xd9) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000840)={'ah\x00'}, &(0x7f0000001a80)=0x1e) 10:18:33 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) dup(r0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x4, 0x1826, 0x2}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:18:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1486.696411] loop3: detected capacity change from 0 to 135266304 [ 1486.719115] loop5: detected capacity change from 0 to 92206592 [ 1486.727193] FAULT_INJECTION: forcing a failure. [ 1486.727193] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.729185] CPU: 0 PID: 8047 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1486.730361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.731824] Call Trace: [ 1486.732295] dump_stack+0x107/0x167 [ 1486.732963] should_fail.cold+0x5/0xa [ 1486.733589] ? create_object.isra.0+0x3a/0xa20 [ 1486.734358] should_failslab+0x5/0x20 [ 1486.735031] kmem_cache_alloc+0x5b/0x310 [ 1486.735700] create_object.isra.0+0x3a/0xa20 [ 1486.736437] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1486.737330] kmem_cache_alloc+0x159/0x310 [ 1486.738053] ? mark_lock+0xf5/0x2df0 [ 1486.738688] __d_alloc+0x2a/0x990 [ 1486.739291] ? lock_acquire+0x197/0x470 [ 1486.739994] d_alloc_parallel+0x111/0x1bc0 [ 1486.740701] ? lock_downgrade+0x6d0/0x6d0 [ 1486.741393] ? find_held_lock+0x2c/0x110 [ 1486.742103] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1486.742798] ? __d_lookup+0x3bf/0x760 [ 1486.743498] ? lockdep_init_map_type+0x2c7/0x780 [ 1486.744187] ? lockdep_init_map_type+0x2c7/0x780 [ 1486.744877] proc_fill_cache+0x2f6/0x4a0 [ 1486.745489] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1486.746330] ? pid_update_inode+0xa0/0xa0 [ 1486.746965] ? pointer+0xa80/0xa80 [ 1486.747429] ? snprintf+0xbb/0x100 [ 1486.748030] proc_pid_readdir+0x3d3/0x830 [ 1486.748655] ? proc_pid_lookup+0x460/0x460 [ 1486.749261] ? down_read+0x191/0x430 [ 1486.749810] ? inode_security+0x107/0x140 [ 1486.750413] proc_root_readdir+0xa0/0xd0 [ 1486.751041] iterate_dir+0x584/0x710 [ 1486.751561] __x64_sys_getdents64+0x13a/0x2c0 [ 1486.752205] ? trace_hardirqs_on+0x5b/0x180 [ 1486.752844] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1486.753540] ? fillonedir+0x4b0/0x4b0 [ 1486.754094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1486.754820] do_syscall_64+0x33/0x40 [ 1486.755383] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.756207] RIP: 0033:0x7f33f1bc1b19 [ 1486.756768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.758782] FAULT_INJECTION: forcing a failure. [ 1486.758782] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.764629] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1486.764646] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1486.764653] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1486.764662] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.764668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.764676] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1486.764885] hpet: Lost 1 RTC interrupts [ 1486.768544] loop1: detected capacity change from 0 to 8388096 [ 1486.768705] CPU: 1 PID: 8057 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1486.775483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.776694] Call Trace: [ 1486.777088] dump_stack+0x107/0x167 [ 1486.777635] should_fail.cold+0x5/0xa [ 1486.778198] ? create_object.isra.0+0x3a/0xa20 [ 1486.778877] should_failslab+0x5/0x20 [ 1486.779442] kmem_cache_alloc+0x5b/0x310 [ 1486.780048] create_object.isra.0+0x3a/0xa20 [ 1486.783781] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1486.784539] kmem_cache_alloc+0x159/0x310 [ 1486.785149] ? proc_free_inode+0x20/0x20 [ 1486.785761] proc_alloc_inode+0x18/0x200 [ 1486.786357] ? proc_free_inode+0x20/0x20 [ 1486.786951] alloc_inode+0x63/0x240 [ 1486.787526] new_inode+0x23/0x250 [ 1486.787998] proc_pid_make_inode+0x22/0x220 [ 1486.788557] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1486.789277] proc_pid_instantiate+0x50/0x1e0 [ 1486.789852] proc_fill_cache+0x373/0x4a0 [ 1486.790372] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1486.791140] ? pid_update_inode+0xa0/0xa0 [ 1486.791690] ? pointer+0xa80/0xa80 [ 1486.792217] ? __switch_to+0x572/0xf70 [ 1486.792813] ? __switch_to_asm+0x3a/0x60 [ 1486.793428] ? snprintf+0xbb/0x100 [ 1486.793974] proc_pid_readdir+0x3d3/0x830 [ 1486.794604] ? proc_pid_lookup+0x460/0x460 [ 1486.795225] ? down_read+0x191/0x430 [ 1486.795766] ? inode_security+0x107/0x140 [ 1486.803726] proc_root_readdir+0xa0/0xd0 [ 1486.804339] iterate_dir+0x584/0x710 [ 1486.804913] __x64_sys_getdents64+0x13a/0x2c0 [ 1486.805584] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1486.806258] ? fput_many+0x2f/0x1a0 [ 1486.806816] ? fillonedir+0x4b0/0x4b0 [ 1486.807391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1486.808158] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1486.808916] do_syscall_64+0x33/0x40 [ 1486.809471] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.810232] RIP: 0033:0x7faf66c84b19 [ 1486.810783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.813424] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1486.814408] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1486.815359] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1486.816316] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.817231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.818143] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1486.821423] FAT-fs (loop5): Unrecognized mount option "subj_use%-" or missing value 10:18:33 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477", 0x85, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:33 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) openat(r0, &(0x7f0000000040)='./file0\x00', 0x6800, 0x8) 10:18:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 3) [ 1486.897617] loop3: detected capacity change from 0 to 135266304 10:18:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 5) [ 1486.926434] FAULT_INJECTION: forcing a failure. [ 1486.926434] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.928092] CPU: 1 PID: 8077 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1486.928967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.930030] Call Trace: [ 1486.930375] dump_stack+0x107/0x167 [ 1486.930852] should_fail.cold+0x5/0xa [ 1486.931343] ? proc_alloc_inode+0x18/0x200 [ 1486.931908] should_failslab+0x5/0x20 [ 1486.932389] kmem_cache_alloc+0x5b/0x310 [ 1486.932914] ? proc_free_inode+0x20/0x20 [ 1486.933435] proc_alloc_inode+0x18/0x200 [ 1486.933956] ? proc_free_inode+0x20/0x20 [ 1486.934476] alloc_inode+0x63/0x240 [ 1486.934941] new_inode+0x23/0x250 [ 1486.935387] proc_pid_make_inode+0x22/0x220 [ 1486.935971] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1486.936709] proc_pid_instantiate+0x50/0x1e0 [ 1486.937386] proc_fill_cache+0x373/0x4a0 [ 1486.937911] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1486.938682] ? pid_update_inode+0xa0/0xa0 [ 1486.939210] ? pointer+0xa80/0xa80 [ 1486.939697] ? snprintf+0xbb/0x100 [ 1486.940165] proc_pid_readdir+0x3d3/0x830 [ 1486.940707] ? proc_pid_lookup+0x460/0x460 [ 1486.941246] ? down_read+0x191/0x430 [ 1486.941725] ? inode_security+0x107/0x140 [ 1486.942261] proc_root_readdir+0xa0/0xd0 [ 1486.942787] iterate_dir+0x584/0x710 [ 1486.943264] __x64_sys_getdents64+0x13a/0x2c0 [ 1486.943864] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1486.944450] ? fput_many+0x2f/0x1a0 [ 1486.944915] ? fillonedir+0x4b0/0x4b0 [ 1486.945413] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1486.946089] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1486.946753] do_syscall_64+0x33/0x40 [ 1486.947230] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.947900] RIP: 0033:0x7f33f1bc1b19 [ 1486.948378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.950741] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1486.951737] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1486.952743] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1486.953660] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.954576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.955494] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1486.960712] loop5: detected capacity change from 0 to 92206592 10:18:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040), 0x6) ioctl$sock_bt_hci(r1, 0x800448d5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x7ff}}, './file0\x00'}) openat(r3, &(0x7f0000000140)='./file0\x00', 0x40002, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) [ 1486.981113] FAULT_INJECTION: forcing a failure. [ 1486.981113] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.982797] CPU: 1 PID: 8080 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1486.983723] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.984791] Call Trace: [ 1486.985129] dump_stack+0x107/0x167 [ 1486.985599] should_fail.cold+0x5/0xa [ 1486.986086] ? security_inode_alloc+0x34/0x160 [ 1486.986671] should_failslab+0x5/0x20 [ 1486.987167] kmem_cache_alloc+0x5b/0x310 [ 1486.987719] security_inode_alloc+0x34/0x160 [ 1486.988284] inode_init_always+0xa4e/0xd10 [ 1486.988827] ? proc_free_inode+0x20/0x20 [ 1486.989350] alloc_inode+0x84/0x240 [ 1486.989819] new_inode+0x23/0x250 [ 1486.990269] proc_pid_make_inode+0x22/0x220 [ 1486.990833] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1486.991567] proc_pid_instantiate+0x50/0x1e0 [ 1486.992155] proc_fill_cache+0x373/0x4a0 [ 1486.992678] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1486.993451] ? pid_update_inode+0xa0/0xa0 [ 1486.993980] ? pointer+0xa80/0xa80 [ 1486.994440] ? __switch_to+0x572/0xf70 [ 1486.994940] ? __switch_to_asm+0x3a/0x60 [ 1486.995465] ? snprintf+0xbb/0x100 [ 1486.995961] proc_pid_readdir+0x3d3/0x830 [ 1486.996510] ? proc_pid_lookup+0x460/0x460 [ 1486.997057] ? down_read+0x191/0x430 [ 1486.997543] ? inode_security+0x107/0x140 [ 1486.998093] proc_root_readdir+0xa0/0xd0 [ 1486.998621] iterate_dir+0x584/0x710 [ 1486.999103] __x64_sys_getdents64+0x13a/0x2c0 [ 1486.999802] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1487.000385] ? fput_many+0x2f/0x1a0 [ 1487.000866] ? fillonedir+0x4b0/0x4b0 [ 1487.001371] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1487.002059] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1487.002728] do_syscall_64+0x33/0x40 [ 1487.003210] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1487.003887] RIP: 0033:0x7faf66c84b19 [ 1487.004362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1487.006730] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1487.007730] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1487.008639] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1487.009562] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.010478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1487.011394] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1487.014235] FAT-fs (loop5): Unrecognized mount option "subj_use%-" or missing value 10:18:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000000)='pstore\x00', 0x92823, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x6}, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x81, 0x35, 0x6, 0x9, 0x0, 0xf3, 0x40000, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000200)}, 0x110, 0x7, 0x10000, 0x6, 0x7fff, 0x9, 0x2, 0x0, 0x8, 0x0, 0x1000}, 0xffffffffffffffff, 0x8, r0, 0x0) openat2(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x41, 0x1b}, 0x18) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x400100, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) sendmsg$nl_generic(r2, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000001e00)={0x698, 0x1e, 0x10, 0x70bd28, 0x25dfdbfc, {0x9}, [@nested={0xd6, 0x2c, 0x0, 0x1, [@typed={0xc, 0x18, 0x0, 0x0, @u64=0x5}, @generic="8c5d1c52e51d8c7b3090464b2b0afa3d59d95a831c7042ffe61bd1e7b9894dd22104b31376888ae96a2745cf73e8112a97546479e424bc4cf2df32860b627d38b36e1d2621545116222b81a543862706d3c9cdeea47f6c8a9dc1a73105665bdad6f34f1c7f587fdbdb14e04a24ae9ab14017", @generic="cf4109f211343d986fa7c48b6b7a8db0f427bf896e049df4471bd945d7d107da7b437d646f11f1ae9cbb74dfecfac655de298811f2255e7cd00faac0b69defc46e533015a5cd1f3640f4314a20f99e442f2bf7c4"]}, @generic="87b75b71a01cae692d2950d77dd7840dde112aaa9e595beda3559a294605f4b0cc82489a1c4ab99e6589b44bf753a35c7dc4594a6ae96885dcb30c6b6515f05e55cadea9516b5b24a74daac7e36104ed953f45d644", @typed={0xe4, 0x11, 0x0, 0x0, @binary="9ae964e53dcd3b224c346d3d65830cd7e32c27bf2ad98987f3aee51e4192d27a100b5827c8d52cdacd025bd64cb3b8487eb178b716b43617d80c81a431c29dc817574f18e7892548b19d48dd2ae58708968eba78269de9a4cf0c1ecd1c4dfd0155807ff5408af793d4d04c9c25e1242d1dc36275f61372bdd297d99cf9073743f749ec85b6ddd945210f059ed6c5daf442f184de8c43ac7af2a37c42c2b7763a30648c2c6f575b3a293c9f6f86bc49572b5ab713f5a92e077ce0dc8bf9b5fde597e22e787545f6b05be9df53a2a63a34db7cbe780ad2628ba37d024d0f770398"}, @typed={0x8, 0x79, 0x0, 0x0, @uid=0xee01}, @nested={0x20c, 0x17, 0x0, 0x1, [@typed={0xc, 0xd, 0x0, 0x0, @u64=0x487}, @typed={0xc, 0x35, 0x0, 0x0, @u64=0x3}, @generic="01077b6660d47cad7814c1055fd72c5e3d4555515d6b134d87e146f11122d835942759b41c33a9f43a2e7e95bfcccb6ac5a172728f6ff66dbbc63c101f5dfb089e9de2e9db83029329309a86b17073a6a14991a11abf55768f224ce7f7f7eab107f5639d107f79c8df0355e20d3647656cde35b8b45a025a294d70761a0cf051d8adcd4d9f8b27e014b2697b02a6aaf13d209617e5a82dd994b7a2958e2ffc61918f382693778dd18a28b429dcd191a884569fcd08a280475b23b151fbeb786b82e65e027731719d388d04a84db91e9b9db1180b", @typed={0x4a, 0x2, 0x0, 0x0, @binary="b8731658cd4154ead48d08613c264ece87de4a0f62645f03aaef539764da7746f8770f22e6d35706577feff06fb73cbe698d571a6d40e2c2697317cf3d817eca9969fc9f0832"}, @typed={0x14, 0x28, 0x0, 0x0, @ipv6=@loopback}, @typed={0x9, 0x22, 0x0, 0x0, @str=':^)@\x00'}, @typed={0x9a, 0x64, 0x0, 0x0, @binary="bdc89a6f76766c6e1c1b2cc242db9566a96fa2c8bc2b7a761d001efaa2a01df96586604df5037e6a52a2e0840fd4790da9c669777696711dacaaf5fd62af6bd182259f31c7182aebb6f5caff75dbd0b352927258a501f6f82a502acb925ff82125be175e6130e4ef17a81f1e20fea694ec6f57f7c693d8f51badb45fef043fd9b2454b0bf40d52349710bcce1136ff3cafda0194f0e7"}, @typed={0x8, 0x90, 0x0, 0x0, @fd=r3}, @typed={0xc, 0x20, 0x0, 0x0, @u64=0x2}]}, @generic="3c2d9bc1412acecec56dc215fc82671120d44439263f442e558a52ca46b329947abb331192734a9a4ef056540bcee91ddf300ce8e91a2570e3293834414d866f43e568bb7694930a41af7a10d8aa4b8e9ab3e6cc9d563a36de56862087224922a074a6645bb08bca6c11ea99bf956a1cc51e3e515d409b4680ca2b0e759aeb5ed57cf7d39c537147ff678098e3cf", @nested={0x1c1, 0x45, 0x0, 0x1, [@generic="21eb14e8d54b6d3650d0d3d77e200491cfed98ca3e475107b16d328e6835efe8eafc286547953df4c89228a69e433e1e6d36bdedc79082256c6f035fdc82a1119c845dde902c80d5d010a755154b66aa236d7451bb024295f56f8460af708d514798dfa69508a182080cc348f9de", @generic="74fae4a6228e36c0fc238d9bacf212b10c9b6b5e3a3d88cf60c2297071be56b0a55f21466b6cf71bd416540c41c52dab6e52ad9a3a36c4e99e74795318258b25c184e313a19bf582b46100725ef3df577dc1b798bc74412fd27ffc91efdda68e180c24f66ac8a2f1fe32d98724b38afdaf51be439194e2a23f3e84feb6", @typed={0x8, 0x41, 0x0, 0x0, @u32=0xffffffff}, @generic="aed8dece1888717114d9ec0965d8cd8bca172aab9c8b840b65a86bd45e10336c2ac07049aad3ebd068c472c3cb2e5ad683943e3ad3f91590d830581379bdcec855c3ae265b377b6fa7f29e6dd44286df9fa254d85b2fa583384f78effeba77433a7593385d278c439ac93cfad909ecf3c42e4e1c10ae9c3577a26190bde18bb947915e28569558868d4ae35a691b1cde7f3e212f5265b2f03ad116a113e3aba73a253b42cc900757f91a890c1f54b966a9132ed7e7e2ce873db84cba65e184d06df6131f403c5d36ac83"]}, @typed={0xc, 0x1b, 0x0, 0x0, @u64=0x1}]}, 0x698}, 0x1, 0x0, 0x0, 0x40004}, 0x4008050) open(&(0x7f0000000340)='./file0\x00', 0x38140, 0xcc) openat(r2, &(0x7f0000000300)='./file0\x00', 0x600800, 0x40) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="03000000000000002abe242a242d732c2d2c272b00"]) 10:18:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) recvmsg$unix(r0, &(0x7f0000000040)={&(0x7f0000000140), 0x6e, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/228, 0xe4}, {&(0x7f00000002c0)=""/130, 0x82}, {&(0x7f0000000380)=""/179, 0xb3}, {&(0x7f0000000440)=""/249, 0xf9}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x5, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x40000022) ioctl$FIOCLEX(r3, 0x5451) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r4, &(0x7f0000000100)=0xfffffffffffff674, r5, 0x0, 0x0, 0x0) sendmsg$nl_generic(r5, &(0x7f00000006c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f0000001880)={0x2d4, 0x29, 0x400, 0x70bd2b, 0x25dfdbfd, {0x20}, [@typed={0x8, 0x4e, 0x0, 0x0, @pid=r2}, @generic="7a14440910c4960d62352603a92de1eb5b1b25056398f92a8025675319b516651ee429eb0a2a9ba3fba942f5488fddce0f161ca018ff3ef90b196b61f0ef7b79b38c8fb02d5f49a6d607058f404af38a12b4fa7f31a47d9bb2e18de5472c9d015e8beafc00d849ff794461db69e32ef2f15a417c09e96c94fc74d88be32c8cea114caebe9b90acdb307ccc8823c18cf4f34fd3e255ff9620ac07357c244f844e01f444c0f9531e328f23ca41978bb7cdf6b660bfb5524a85c4dd9005d2ee24f86c5b1e762375378f4dffbf8c4c8900377bd585e56af162dc42534ba8364b", @typed={0x8, 0x69, 0x0, 0x0, @ipv4=@empty}, @typed={0xb8, 0x64, 0x0, 0x0, @binary="aa8acb95a245304888ebdd6e1fd6a0bd788106d6b5a086b33331cf3c66410dd9c023a77a0d2e42b6da3bad92c054ed769055512ee3c57dd51c796858b9e0146620df345af4d83bddb4e5c55f7cdfbc12d9a42327db928c67395b1b611a4d6e589aaf6c473daae773aaae48b33c2c39e6288e6a849328254b40e998c697221ed52c1cd3000cc2eb8088daddf214b67d9b74392ca344cd4fc6a80dee212241e66211d8cfc681370a9e359601aecd596e8162c2237f"}, @nested={0x104, 0xd, 0x0, 0x1, [@generic="6e415bbedef41469788c48ae9c35612f2b7a5ab1d0e9d3024c3944241cccb11f01320411d2b915d1ca27c0e9b67fe9da4b5acbcf6a1daed5c29e88eba4611e674589d49044fac59e7e6cd578355240a103dfe07867aead98f57cca56a3cfd380b369d29e84c2fe3318a578449a0fb6968681d79417e92c2b5c4f0a43818786c2fb79a5010d7e3ea302d523093d1fffb7204a93bf6ee0a146e1f3b8063d54ea97b86237743a96765e567f1c30bdce7c63ad90a08b99a3cf61319c7e22b9eaa9fa7b3e00574fb7abc00d29ffc8bfcfaa4fb8331065a8ec0930", @typed={0x8, 0x3, 0x0, 0x0, @fd=r1}, @typed={0x8, 0x8, 0x0, 0x0, @fd=r3}, @generic="f377dc756aca65216247285ab3d72489", @typed={0x8, 0x6b, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @typed={0x14, 0x93, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x10}, 0x40801) 10:18:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x100) getdents64(r1, &(0x7f0000000140)=""/198, 0xc6) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) r4 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd=r3, 0x0, 0x0, 0x1, 0x1b, 0x0, {0x0, r5, r1}}, 0x24) 10:18:33 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477", 0x85, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1840486, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x1}}, './file1\x00'}) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000140)=""/32) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:18:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 6) 10:18:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:18:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 4) 10:18:47 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:18:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x4, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x637}, 0x0, 0xffffffffffffffff, r0, 0xb) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = syz_mount_image$nfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x7, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="c543313abedb0dcb4818689bd185a0ef1c0a8bc42ea1bd4fb5fa71f932db5d409dad012e9064f0ff8510c8b4d9d68a99fb4a97e738216f0a14db3cb2017cc586ccf15bbba2588765f9ff631c9408be231de4d2c199b78184531dddbbf53fd320776a16e249d642050a33c961c2a0a9dadb7f6f1ec18b170cf22a049cf28072a428b1a6e25b565f2a5c4b01869eee45d65706533d0ecd9711cfc41111c68cecd162aada6c4e5b0ab7ad5b098d3802c622c96ccf58ff9e9c12a23569f189c8d7f3668b2d269542df82680fe021", 0xcc, 0x2}], 0x10040a8, &(0x7f0000000500)=ANY=[@ANYBLOB='trusted.overlay.redirect\x00,proc\x00,proc\x00,,proc\x00,proc\x00,/,func=POLICY_CHECK,subj_user=proc\x00,mask=MAY_APPEND,audit,fsuuid=cb75dfb6-7a37-\x0085d-962e-73173f9a,euid=', @ANYRESDEC=0xee00, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c6673757569643d38373436323431662d393736002d3962335c3fea664cfadd3b8511e91becce68652d673165042d38303333e66133302c00"]) openat(r2, &(0x7f00000004c0)='./file0\x00', 0x100, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1500.851929] FAULT_INJECTION: forcing a failure. [ 1500.851929] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.857620] CPU: 1 PID: 8108 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1500.858505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1500.859615] Call Trace: [ 1500.859970] dump_stack+0x107/0x167 [ 1500.860437] should_fail.cold+0x5/0xa [ 1500.860932] ? create_object.isra.0+0x3a/0xa20 [ 1500.861517] should_failslab+0x5/0x20 [ 1500.862004] kmem_cache_alloc+0x5b/0x310 [ 1500.862529] create_object.isra.0+0x3a/0xa20 [ 1500.863091] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 10:18:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x30800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80, 0x9}, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) dup3(r2, r1, 0x0) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x400020, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x60, 0x88, 0x9, 0x40, 0x0, 0x2, 0x2294, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040)}, 0x401, 0xfaa, 0x81, 0x5, 0x7, 0x80000000, 0x9, 0x0, 0x4, 0x0, 0x49a}, 0xffffffffffffffff, 0xe, r0, 0xb) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000001c0)) [ 1500.863740] kmem_cache_alloc+0x159/0x310 [ 1500.872284] ? proc_free_inode+0x20/0x20 [ 1500.872806] proc_alloc_inode+0x18/0x200 [ 1500.873324] ? proc_free_inode+0x20/0x20 [ 1500.873845] alloc_inode+0x63/0x240 10:18:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x3, 0x1ff, 0x3, 0x7fffffff, 0xbbc]}, &(0x7f0000000040)=0x54) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1500.874310] new_inode+0x23/0x250 [ 1500.880070] proc_pid_make_inode+0x22/0x220 [ 1500.880627] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1500.881301] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1500.882044] proc_pid_instantiate+0x50/0x1e0 [ 1500.882609] proc_fill_cache+0x373/0x4a0 [ 1500.883132] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1500.888266] ? pid_update_inode+0xa0/0xa0 [ 1500.888799] ? pointer+0xa80/0xa80 [ 1500.889265] ? snprintf+0xbb/0x100 [ 1500.889740] proc_pid_readdir+0x3d3/0x830 [ 1500.890357] ? proc_pid_lookup+0x460/0x460 [ 1500.890895] ? down_read+0x191/0x430 [ 1500.891380] ? inode_security+0x107/0x140 [ 1500.891938] proc_root_readdir+0xa0/0xd0 [ 1500.892468] iterate_dir+0x584/0x710 [ 1500.892952] __x64_sys_getdents64+0x13a/0x2c0 [ 1500.893527] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1500.894108] ? fput_many+0x2f/0x1a0 [ 1500.894574] ? fillonedir+0x4b0/0x4b0 [ 1500.895069] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1500.895736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1500.896431] do_syscall_64+0x33/0x40 [ 1500.896911] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1500.897567] RIP: 0033:0x7f33f1bc1b19 [ 1500.898056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.900420] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1500.901399] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1500.902312] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1500.903224] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.904146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1500.905061] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1500.912724] loop3: detected capacity change from 0 to 1024 [ 1500.965135] FAULT_INJECTION: forcing a failure. [ 1500.965135] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.966733] CPU: 1 PID: 8111 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1500.967625] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1500.968808] Call Trace: [ 1500.969171] dump_stack+0x107/0x167 [ 1500.969671] should_fail.cold+0x5/0xa [ 1500.970190] ? create_object.isra.0+0x3a/0xa20 [ 1500.970809] should_failslab+0x5/0x20 [ 1500.971307] kmem_cache_alloc+0x5b/0x310 [ 1500.971848] create_object.isra.0+0x3a/0xa20 [ 1500.972425] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1500.973080] kmem_cache_alloc+0x159/0x310 [ 1500.973618] security_inode_alloc+0x34/0x160 [ 1500.974183] inode_init_always+0xa4e/0xd10 [ 1500.974725] ? proc_free_inode+0x20/0x20 [ 1500.975247] alloc_inode+0x84/0x240 [ 1500.975718] new_inode+0x23/0x250 [ 1500.976188] proc_pid_make_inode+0x22/0x220 [ 1500.976744] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1500.977423] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1500.978162] proc_pid_instantiate+0x50/0x1e0 [ 1500.978729] proc_fill_cache+0x373/0x4a0 [ 1500.979250] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1500.980036] ? pid_update_inode+0xa0/0xa0 [ 1500.980568] ? pointer+0xa80/0xa80 [ 1500.981033] ? snprintf+0xbb/0x100 [ 1500.981508] proc_pid_readdir+0x3d3/0x830 [ 1500.982050] ? proc_pid_lookup+0x460/0x460 [ 1500.982590] ? down_read+0x191/0x430 [ 1500.983061] ? inode_security+0x107/0x140 [ 1500.983610] proc_root_readdir+0xa0/0xd0 [ 1500.984180] iterate_dir+0x584/0x710 [ 1500.984664] __x64_sys_getdents64+0x13a/0x2c0 [ 1500.985241] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1500.985825] ? fput_many+0x2f/0x1a0 [ 1500.986293] ? fillonedir+0x4b0/0x4b0 [ 1500.986789] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1500.987463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1500.988138] do_syscall_64+0x33/0x40 [ 1500.988623] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1500.989280] RIP: 0033:0x7faf66c84b19 [ 1500.989759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.992164] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1500.993151] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1500.994062] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1500.994984] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.995926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1500.996849] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:18:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) recvmmsg$unix(r0, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:19:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 7) 10:19:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'caif0\x00', &(0x7f0000000040)=@ethtool_eee={0x44, 0x7, 0x80000001, 0x5c, 0x5, 0x9, 0x7, 0x5, [0x3f, 0x3f]}}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(r1, &(0x7f0000000200)=@pppoe={0x18, 0x0, {0x3, @remote, 'ip6gretap0\x00'}}, 0x80) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1514.836048] hpet: Lost 1 RTC interrupts [ 1514.881099] FAULT_INJECTION: forcing a failure. [ 1514.881099] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.883675] CPU: 1 PID: 8155 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1514.884561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1514.885625] Call Trace: [ 1514.885972] dump_stack+0x107/0x167 [ 1514.886442] should_fail.cold+0x5/0xa [ 1514.886934] ? security_inode_alloc+0x34/0x160 10:19:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2080, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r1, 0x0, r0, 0x2) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x20, 0x3f, 0x5, 0xc8, 0x0, 0x35, 0x8000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x408, 0x1, 0x0, 0x6, 0x7, 0x3, 0x8001, 0x0, 0x20, 0x0, 0x9}, r1, 0x10, r3, 0x2) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:19:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x9, 0x4000) accept4(r1, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000380)=0x80, 0x80800) openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/module/nmi_backtrace', 0x44240, 0x6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x412080, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000400)=0xfffffffffffffff9) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:19:01 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:19:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:19:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2000, 0x42) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = io_uring_setup(0x2f29, &(0x7f00000003c0)={0x0, 0xbdba, 0x4, 0x1, 0x18e}) syz_io_uring_setup(0x1334, &(0x7f0000000500)={0x0, 0x3137, 0x1, 0x2, 0x36b, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000580)) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x62) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x7, 0x0, 0x4, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x7ff}, 0x0, 0xa, 0xffffffffffffffff, 0x11) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000140)=0x3) r3 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r3, 0x0, r2, 0x2) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0x3, 0x37, 0x5, 0x7, 0x0, 0x5, 0x88a8, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4de, 0x2}, 0x1084, 0x7fffffff, 0x7ff, 0x7, 0xd7, 0x7, 0x0, 0x0, 0x355, 0x0, 0xa4}, 0x0, 0xa, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x1f, 0x80, 0x11, 0x2a, 0x0, 0x80000000, 0xa0420, 0xccd262773566cb49, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000240)}, 0x1428, 0x1975, 0x7, 0x1, 0x6, 0x7f, 0x80, 0x0, 0x2, 0x0, 0x9}, r3, 0x2, r1, 0x2) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'mangle\x00', 0x0, [0x30000, 0x0, 0x81, 0xffffffff, 0x2]}, &(0x7f0000000200)=0x54) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:19:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 5) [ 1514.887523] should_failslab+0x5/0x20 [ 1514.892082] kmem_cache_alloc+0x5b/0x310 [ 1514.892609] security_inode_alloc+0x34/0x160 [ 1514.893177] inode_init_always+0xa4e/0xd10 [ 1514.893721] ? proc_free_inode+0x20/0x20 [ 1514.894240] alloc_inode+0x84/0x240 [ 1514.894712] new_inode+0x23/0x250 [ 1514.895161] proc_pid_make_inode+0x22/0x220 [ 1514.895718] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1514.897094] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1514.898806] proc_pid_instantiate+0x50/0x1e0 [ 1514.900122] proc_fill_cache+0x373/0x4a0 [ 1514.901355] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1514.903130] ? pid_update_inode+0xa0/0xa0 [ 1514.906669] FAULT_INJECTION: forcing a failure. [ 1514.906669] name failslab, interval 1, probability 0, space 0, times 0 [ 1514.912341] ? pointer+0xa80/0xa80 [ 1514.912367] ? snprintf+0xbb/0x100 [ 1514.912401] proc_pid_readdir+0x3d3/0x830 [ 1514.912423] ? proc_pid_lookup+0x460/0x460 [ 1514.912438] ? down_read+0x191/0x430 [ 1514.912450] ? inode_security+0x107/0x140 [ 1514.912471] proc_root_readdir+0xa0/0xd0 [ 1514.912487] iterate_dir+0x584/0x710 [ 1514.912506] __x64_sys_getdents64+0x13a/0x2c0 [ 1514.912523] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1514.912535] ? fput_many+0x2f/0x1a0 [ 1514.912548] ? fillonedir+0x4b0/0x4b0 [ 1514.912570] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1514.912586] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1514.912603] do_syscall_64+0x33/0x40 [ 1514.912618] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1514.912628] RIP: 0033:0x7f33f1bc1b19 [ 1514.912643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:19:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1514.912651] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1514.912667] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1514.912676] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1514.912685] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1514.912693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1514.912700] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1514.966171] CPU: 0 PID: 8144 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1514.967072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1514.968173] Call Trace: [ 1514.968529] dump_stack+0x107/0x167 [ 1514.968996] should_fail.cold+0x5/0xa [ 1514.969498] ? __d_alloc+0x2a/0x990 [ 1514.969983] should_failslab+0x5/0x20 [ 1514.970499] kmem_cache_alloc+0x5b/0x310 [ 1514.971039] ? mark_lock+0xf5/0x2df0 [ 1514.971539] __d_alloc+0x2a/0x990 [ 1514.972021] ? lock_acquire+0x197/0x470 [ 1514.972555] d_alloc_parallel+0x111/0x1bc0 [ 1514.973121] ? lock_downgrade+0x6d0/0x6d0 [ 1514.973672] ? find_held_lock+0x2c/0x110 [ 1514.974223] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1514.974771] ? __d_lookup+0x3bf/0x760 [ 1514.975282] ? lockdep_init_map_type+0x2c7/0x780 [ 1514.975925] ? lockdep_init_map_type+0x2c7/0x780 [ 1514.976568] proc_fill_cache+0x2f6/0x4a0 [ 1514.977104] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1514.977893] ? pid_update_inode+0xa0/0xa0 [ 1514.978435] ? pointer+0xa80/0xa80 [ 1514.978926] ? snprintf+0xbb/0x100 [ 1514.979419] proc_pid_readdir+0x3d3/0x830 [ 1514.979989] ? proc_pid_lookup+0x460/0x460 [ 1514.980553] ? inode_security+0x107/0x140 [ 1514.981114] proc_root_readdir+0xa0/0xd0 [ 1514.981652] iterate_dir+0x584/0x710 [ 1514.982152] __x64_sys_getdents64+0x13a/0x2c0 [ 1514.982743] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1514.983343] ? fput_many+0x2f/0x1a0 [ 1514.983826] ? fillonedir+0x4b0/0x4b0 [ 1514.984350] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1514.985050] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1514.985731] do_syscall_64+0x33/0x40 [ 1514.986225] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1514.986897] RIP: 0033:0x7faf66c84b19 [ 1514.987389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1514.989798] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1514.990796] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1514.991729] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1514.992676] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1514.993609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1514.994541] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:19:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x8, 0x4, &(0x7f0000000400)=[{&(0x7f0000000180)="56b95dfd6f0c840f3598306d8a7cb5a821624a94024f353a18673eb84648c4dfae100ff958223d4c31a8e8b87cbec7ad7f1e", 0x32, 0x9}, {&(0x7f00000001c0)="747a3a9f544be3d5d631ac4263bdb8c1d6bd0b72d3a6c479e1aa5be877ceea690334", 0x22}, {&(0x7f0000000200)="08436b6d955b79d2ec1f8a819dba2a0f8df9bc7a751f2c9d681c9a812a758ddd312a7b9db43d34257eadd611389dd73e8f0826fe48f454a3c9e4ef334dd02bbda751f875529540a782c62b073e9d8bb78587a723d092a53a3fc144c3d0b3d2017774c5961db92429b800ffe0004d6900448bf34dd553a29aa31ba03aed13e7fdf99fdebf7ecc3e1ab344d521bf35d12113227047aefa57bfcab1e202c1027cebedb50c8de4129099e2a7edd604524d33868160d0e37d911aef65d1604130267378dd6edd170e4f51a5f66156dd005a7184703ba468753697f5294dc22d05d7265f7f3ce4db9bbebe09cfd7e1bc7558", 0xef, 0x1}, {&(0x7f0000000300)="e1988cf92fec46dab5fde4775a7131ef5a8065e5929748f86a2230877bc8ac8bc2c6cdca5a109387d516ddf590f0a77294b0c79ed8acfea5449a05729d51c933c08fd630980673fa0456f9da41359a93dd50482734ed07d5dd6fe379cb596c28643e35bec8e89f747fc501c6d0a268f2edd55afcda9a4d1d63b1d5f0dea2243b6c133d814dfb5c50577b48e045d9b49f084ef59db3e9c27304c8a13c4b48bfe8c9fcf91d786cd06d18bdce20610cadc8021076b80ebb8189fdd16addee353104151fd9f858acf241c80f9c2830584d8a2114d5bf61fb25bd04febaf88cf6dfd6ac7d6dd10ef40f717da75b484e0484775dbe6adae7f69273", 0xf8, 0x86}], 0x22000, &(0x7f0000000480)={[{@numtail}, {@fat=@check_strict}, {@fat=@nocase}, {@uni_xlate}, {@rodir}], [{@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@pcr={'pcr', 0x3d, 0x15}}, {@smackfshat={'smackfshat', 0x3d, '*]$(}@-'}}]}) syz_mount_image$ext4(&(0x7f0000000500)='ext4\x00', &(0x7f0000000540)='./file0\x00', 0x5, 0x5, &(0x7f0000001880)=[{&(0x7f0000000580)="b4e6fa505dc04066a2ca830cbebd4045c2958f56f2f47d040fdbfb95dc518d92df5861ebc114938699338fe6846fde8dcd0842d232e4d101baee31ab195ab29ede008f4cc22424b30a5c249d447544329f520341d2ba7bde6e538a75452f730cee552ecd1fd8d858f95c41", 0x6b, 0x4}, {&(0x7f0000000600)="25c52f75f94e0e0dbbfd9e99b70bc31ef060c143f2cd2ae19290c9cc90fcfedb37276f4cdda9f90e5ecc8885f6e8eb8ddb3c86dd368d872b5f085ecd38476a077164fc120e9daaa7bda2c9a6daf6a879c9dc26c06bd2a2eb119e18a90598d9b7c13fb4c10e168d8aae07bbc4e445a6ea05d0af6b7e3180b19e3acc0ecf14533ed5945f833b581c1858564a9bd51065d62f5872840878cc32d5f56c2e1794f777acc71bb8d0d3ee78e061024faee7b8564557f4cba17baa537500087aa257c6a0e7371b591a06809e8a89c1c5a47921ab598bf966d1d8d6975e1425e5b31ec6423fc50a8b0cc427892225631518ac24", 0xef, 0x5}, {&(0x7f0000000700)="fcd205606523d297475b696c4f6dd435a950d88aede0692aa5b53e1a63e35ebcc212d55d39e9e177f38c1bea7d39b0c33a429f61b02bd93dc501ecade07d085e32f7dfc9a976ba27ed00acb434df8a29cf503bfb318e2685d18c1b46235d0e345baea5779a559cbacd55f637ae35b57b441f936ce767ad8a0f36752c1a9bb8a18a6c5d2870bf9ce18700c9f53038a05d5d038e0ba22ffb456bc8d41643bbfdbca246038f542835ff889cf58f6d67269a18e7da44569c9299be400120140440835c96b468616c5ad92e", 0xc9, 0x5}, {&(0x7f0000001e00)="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", 0x1000, 0xfff}, {&(0x7f0000000800)="99b055feccdc8f7e4a5ee3da52654557173b13c56e2b96bdb3aacc6b2dd71600282c2a6706f7cc1197d5d577b9bdf0a63d779b8fe587e1a5fb8f2faa745910e2080e1c7d747722a10e3cc210340969e7b9290f", 0x53, 0x3ff}], 0x21080f, &(0x7f0000001900)={[{@sb={'sb', 0x3d, 0x7f}}, {@jqfmt_vfsv0}, {@nobarrier}, {@oldalloc}, {@quota}, {@journal_async_commit}, {@sb={'sb', 0x3d, 0x7}}, {@data_err_abort}, {@journal_dev={'journal_dev', 0x3d, 0x7}}], [{@smackfshat={'smackfshat', 0x3d, 'rodir'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'smackfsroot'}}, {@subj_type={'subj_type', 0x3d, 'check=strict'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@obj_type={'obj_type', 0x3d, 'rodir'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1514.995667] hpet: Lost 1 RTC interrupts [ 1515.012021] loop3: detected capacity change from 0 to 1024 10:19:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 6) 10:19:01 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000140)=0x5) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x10e) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1515.127210] audit: type=1400 audit(1750241941.924:48): avc: denied { setattr } for pid=8172 comm="syz-executor.4" path="/proc/8172/task/8175/attr/current" dev="proc" ino=30538 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 10:19:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 8) 10:19:01 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='affs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x3004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x139) openat(r1, &(0x7f0000000140)='./file0\x00', 0x51c00, 0x11) unlinkat(r0, &(0x7f0000000180)='./file1\x00', 0x200) [ 1515.165984] FAULT_INJECTION: forcing a failure. [ 1515.165984] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.167654] CPU: 0 PID: 8178 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1515.168553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.169611] Call Trace: [ 1515.169956] dump_stack+0x107/0x167 [ 1515.170425] should_fail.cold+0x5/0xa [ 1515.170916] ? create_object.isra.0+0x3a/0xa20 [ 1515.171526] should_failslab+0x5/0x20 [ 1515.172033] kmem_cache_alloc+0x5b/0x310 [ 1515.172560] create_object.isra.0+0x3a/0xa20 [ 1515.173123] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1515.173771] kmem_cache_alloc+0x159/0x310 [ 1515.174316] __d_alloc+0x2a/0x990 [ 1515.174763] ? lock_acquire+0x197/0x470 [ 1515.175275] d_alloc_parallel+0x111/0x1bc0 [ 1515.175819] ? lock_downgrade+0x6d0/0x6d0 [ 1515.176366] ? find_held_lock+0x2c/0x110 [ 1515.176893] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1515.177420] ? __d_lookup+0x3bf/0x760 [ 1515.177912] ? lockdep_init_map_type+0x2c7/0x780 [ 1515.178517] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.179187] ? lockdep_init_map_type+0x2c7/0x780 [ 1515.179796] proc_fill_cache+0x2f6/0x4a0 [ 1515.180340] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1515.181107] ? pid_update_inode+0xa0/0xa0 [ 1515.181638] ? pointer+0xa80/0xa80 [ 1515.182102] ? snprintf+0xbb/0x100 [ 1515.182574] proc_pid_readdir+0x3d3/0x830 [ 1515.183112] ? proc_pid_lookup+0x460/0x460 [ 1515.183654] ? inode_security+0x107/0x140 [ 1515.184211] proc_root_readdir+0xa0/0xd0 [ 1515.184734] iterate_dir+0x584/0x710 [ 1515.185216] __x64_sys_getdents64+0x13a/0x2c0 [ 1515.185788] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1515.186377] ? fput_many+0x2f/0x1a0 [ 1515.186842] ? fillonedir+0x4b0/0x4b0 [ 1515.187336] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.188020] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.188681] do_syscall_64+0x33/0x40 [ 1515.189160] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.189815] RIP: 0033:0x7faf66c84b19 [ 1515.190293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.192737] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1515.193840] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1515.194871] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1515.195900] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.196941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1515.197972] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1515.199094] hpet: Lost 1 RTC interrupts [ 1515.241879] FAULT_INJECTION: forcing a failure. [ 1515.241879] name failslab, interval 1, probability 0, space 0, times 0 [ 1515.243624] CPU: 1 PID: 8180 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1515.244530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1515.245611] Call Trace: [ 1515.245969] dump_stack+0x107/0x167 [ 1515.246452] should_fail.cold+0x5/0xa [ 1515.246954] ? create_object.isra.0+0x3a/0xa20 [ 1515.247556] should_failslab+0x5/0x20 [ 1515.248072] kmem_cache_alloc+0x5b/0x310 [ 1515.248619] create_object.isra.0+0x3a/0xa20 [ 1515.249199] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1515.249867] kmem_cache_alloc+0x159/0x310 [ 1515.250432] security_inode_alloc+0x34/0x160 [ 1515.251022] inode_init_always+0xa4e/0xd10 [ 1515.251585] ? proc_free_inode+0x20/0x20 [ 1515.252144] alloc_inode+0x84/0x240 [ 1515.252628] new_inode+0x23/0x250 [ 1515.253098] proc_pid_make_inode+0x22/0x220 [ 1515.253672] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.254368] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1515.255126] proc_pid_instantiate+0x50/0x1e0 [ 1515.255702] proc_fill_cache+0x373/0x4a0 [ 1515.260273] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1515.261066] ? pid_update_inode+0xa0/0xa0 [ 1515.261611] ? pointer+0xa80/0xa80 [ 1515.262096] ? snprintf+0xbb/0x100 [ 1515.262593] proc_pid_readdir+0x3d3/0x830 [ 1515.263152] ? proc_pid_lookup+0x460/0x460 [ 1515.263710] ? down_read+0x191/0x430 [ 1515.264211] ? inode_security+0x107/0x140 [ 1515.264767] proc_root_readdir+0xa0/0xd0 [ 1515.265306] iterate_dir+0x584/0x710 [ 1515.265806] __x64_sys_getdents64+0x13a/0x2c0 [ 1515.266399] ? hrtimer_interrupt+0x771/0x9b0 [ 1515.266984] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1515.267573] ? fillonedir+0x4b0/0x4b0 [ 1515.268104] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1515.268797] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.269483] do_syscall_64+0x33/0x40 [ 1515.269981] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1515.270660] RIP: 0033:0x7f33f1bc1b19 [ 1515.271155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.281794] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1515.282907] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1515.283978] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1515.285032] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.286083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1515.287147] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 10:19:02 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1515.391774] loop3: detected capacity change from 0 to 1024 [ 1515.768004] hpet: Lost 1 RTC interrupts [ 1516.744226] hpet: Lost 3 RTC interrupts 10:19:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 7) [ 1529.204785] 9pnet: p9_fd_create_unix (8204): problem connecting socket: ./file0: -111 [ 1529.207972] loop3: detected capacity change from 0 to 135266304 [ 1529.215302] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:19:15 executing program 1: pipe(&(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x12, 0x0, {0x0, r2}}, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) recvmmsg$unix(r3, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000180)={0x8001, 0x4645, 0x1, 0x3, 0x5}, 0x14) 10:19:15 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x0, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:19:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x1800, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:19:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 9) 10:19:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x8000000000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:19:15 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r2, r3, 0x800) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000001e00)=ANY=[@ANYBLOB="4c1300001f0001002dbd7000fbdbdf251c00000014002e8008002800e000000208008400ac14143c69003880fd08bc4b1b5ddbc7597c2273c1ba5cec6e658799f438757ff80dae3aa4dbc37099f9c449e5d684b3a4bfb2a631228ded1ced9c95e8e95b0f390f6c2295bd6d69da0b24d30bf0fd93bf6399e9bb6991de3220517269050016000000000008005e00", @ANYRES32=r2, @ANYBLOB="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"/282, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="080021002a5b5c004b830878f226f9a59afb495c2a260e1318b8f7555deb3a8bd25db9a003c813dd5c3e19cf129a670200692f4ec5526f5c231fd4ea8a98eee8581b3bff6a92e05e31fd22ced5c63aca83eb8e59b8ca6850c3557ba83ebc6fb250b66f35b576d02a24c2fa3db22ca26a11027f2a6047022b2b8085fdeafedd31477415545865a6aad620f5ef1a2b7e9a773bf56defd25d6e66daed"], 0x134c}, 0x1, 0x0, 0x0, 0x28000090}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r5, &(0x7f0000000100)=0xfffffffffffff674, r6, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r5, {0x8000}}, './file1\x00'}) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:19:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = getuid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2000000, &(0x7f00000001c0)={'trans=unix,', {[{@version_u}, {@cache_loose}, {@dfltgid}, {@access_user}, {@privport}], [{@smackfstransmute={'smackfstransmute', 0x3d, '(*'}}, {@uid_gt={'uid>', r2}}, {@audit}]}}) [ 1529.234248] FAULT_INJECTION: forcing a failure. [ 1529.234248] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.235964] CPU: 1 PID: 8207 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1529.236884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1529.238008] Call Trace: [ 1529.238381] dump_stack+0x107/0x167 [ 1529.238909] should_fail.cold+0x5/0xa [ 1529.239440] ? __d_alloc+0x2a/0x990 [ 1529.239956] should_failslab+0x5/0x20 [ 1529.240492] kmem_cache_alloc+0x5b/0x310 [ 1529.241037] ? mark_lock+0xf5/0x2df0 [ 1529.241550] __d_alloc+0x2a/0x990 [ 1529.242025] ? lock_acquire+0x197/0x470 [ 1529.242580] d_alloc_parallel+0x111/0x1bc0 [ 1529.242963] FAULT_INJECTION: forcing a failure. [ 1529.242963] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.243132] ? lock_downgrade+0x6d0/0x6d0 [ 1529.245101] ? find_held_lock+0x2c/0x110 [ 1529.245655] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1529.246187] ? __d_lookup+0x3bf/0x760 [ 1529.246699] ? lockdep_init_map_type+0x2c7/0x780 [ 1529.247306] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1529.247997] ? lockdep_init_map_type+0x2c7/0x780 [ 1529.248651] proc_fill_cache+0x2f6/0x4a0 [ 1529.249170] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1529.250038] ? pid_update_inode+0xa0/0xa0 [ 1529.250572] ? pointer+0xa80/0xa80 [ 1529.251038] ? snprintf+0xbb/0x100 [ 1529.251516] proc_pid_readdir+0x3d3/0x830 [ 1529.252052] ? proc_pid_lookup+0x460/0x460 [ 1529.252614] ? inode_security+0x107/0x140 [ 1529.253152] proc_root_readdir+0xa0/0xd0 [ 1529.253681] iterate_dir+0x584/0x710 [ 1529.254163] __x64_sys_getdents64+0x13a/0x2c0 [ 1529.254739] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1529.255322] ? fput_many+0x2f/0x1a0 [ 1529.255787] ? fillonedir+0x4b0/0x4b0 [ 1529.264320] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1529.265013] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1529.265705] do_syscall_64+0x33/0x40 [ 1529.266187] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1529.266862] RIP: 0033:0x7f33f1bc1b19 [ 1529.267344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1529.273770] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1529.274765] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1529.275701] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1529.276657] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.277587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1529.278519] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1529.279561] CPU: 0 PID: 8214 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1529.282013] 9pnet: p9_fd_create_unix (8220): problem connecting socket: ./file0: -111 [ 1529.284481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1529.284487] Call Trace: [ 1529.284508] dump_stack+0x107/0x167 [ 1529.284527] should_fail.cold+0x5/0xa [ 1529.287863] ? proc_alloc_inode+0x18/0x200 [ 1529.292428] should_failslab+0x5/0x20 [ 1529.292923] kmem_cache_alloc+0x5b/0x310 [ 1529.293471] ? proc_free_inode+0x20/0x20 [ 1529.293996] proc_alloc_inode+0x18/0x200 [ 1529.294516] ? proc_free_inode+0x20/0x20 [ 1529.295036] alloc_inode+0x63/0x240 [ 1529.295505] new_inode+0x23/0x250 [ 1529.295953] proc_pid_make_inode+0x22/0x220 [ 1529.296527] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1529.297263] proc_pid_instantiate+0x50/0x1e0 [ 1529.297829] proc_fill_cache+0x373/0x4a0 [ 1529.298349] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1529.299117] ? pid_update_inode+0xa0/0xa0 [ 1529.299650] ? pointer+0xa80/0xa80 [ 1529.300125] ? snprintf+0xbb/0x100 [ 1529.300608] proc_pid_readdir+0x3d3/0x830 [ 1529.301146] ? proc_pid_lookup+0x460/0x460 [ 1529.301689] ? inode_security+0x107/0x140 [ 1529.302227] proc_root_readdir+0xa0/0xd0 [ 1529.302752] iterate_dir+0x584/0x710 [ 1529.303234] __x64_sys_getdents64+0x13a/0x2c0 [ 1529.303809] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1529.304406] ? fput_many+0x2f/0x1a0 [ 1529.304879] ? fillonedir+0x4b0/0x4b0 [ 1529.305384] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1529.306064] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1529.306726] do_syscall_64+0x33/0x40 [ 1529.307205] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1529.307888] RIP: 0033:0x7faf66c84b19 [ 1529.308377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1529.310765] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1529.311741] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1529.316664] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1529.317576] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.318515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 10:19:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1529.319419] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1529.320562] hpet: Lost 2 RTC interrupts 10:19:16 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x0, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:19:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x1022080, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1529.384693] loop3: detected capacity change from 0 to 135266304 [ 1529.399636] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 10:19:16 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x400) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:19:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x10000, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x10b) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000040)={@id={0x2, 0x0, @auto="5707e1537232a4ec1bb89514dbc9d7a6"}}) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) close(r1) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x91, 0x1f, 0x8, 0x2, 0x0, 0x1, 0x0, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1f00000000000}, 0x202, 0x8, 0x6, 0x9, 0x80, 0xffffffff, 0x3, 0x0, 0x7fffffff}, 0x0, 0xe, r0, 0x3) 10:19:16 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x0, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:19:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) fchmod(r1, 0x100) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x402600, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000040)={0x0, 'ip6tnl0\x00', {0x2}, 0x8c15}) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:19:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 10) 10:19:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 8) 10:19:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r3, &(0x7f0000000100)=0xfffffffffffff674, r4, 0x0, 0x0, 0x0) r5 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000200), 0x2, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0x3, 0x0, r3, &(0x7f00000001c0)={0x50000005}, r5, 0x3, 0x0, 0x1, {0x0, r6}}, 0x4) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r2, 0x0, r1, 0x2) write$cgroup_pid(r0, &(0x7f0000000180)=r2, 0x12) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fsetxattr$security_selinux(r7, &(0x7f0000000040), &(0x7f0000000140)='system_u:object_r:traceroute_exec_t:s0\x00', 0x27, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r8, &(0x7f0000000880)=""/4096, 0x1000) [ 1529.576892] FAULT_INJECTION: forcing a failure. [ 1529.576892] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.578328] FAULT_INJECTION: forcing a failure. [ 1529.578328] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.578732] CPU: 0 PID: 8255 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1529.580793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1529.581870] Call Trace: [ 1529.582221] dump_stack+0x107/0x167 [ 1529.582713] should_fail.cold+0x5/0xa [ 1529.583208] ? create_object.isra.0+0x3a/0xa20 [ 1529.583820] should_failslab+0x5/0x20 [ 1529.584341] kmem_cache_alloc+0x5b/0x310 [ 1529.584890] create_object.isra.0+0x3a/0xa20 [ 1529.585463] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1529.586127] kmem_cache_alloc+0x159/0x310 [ 1529.586701] ? mark_lock+0xf5/0x2df0 [ 1529.587183] __d_alloc+0x2a/0x990 [ 1529.587651] ? lock_acquire+0x197/0x470 [ 1529.588176] d_alloc_parallel+0x111/0x1bc0 [ 1529.588742] ? lock_downgrade+0x6d0/0x6d0 [ 1529.589272] ? find_held_lock+0x2c/0x110 [ 1529.589820] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1529.590355] ? __d_lookup+0x3bf/0x760 [ 1529.590865] ? lockdep_init_map_type+0x2c7/0x780 [ 1529.591490] ? lockdep_init_map_type+0x2c7/0x780 [ 1529.592120] proc_fill_cache+0x2f6/0x4a0 [ 1529.592666] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1529.593440] ? pid_update_inode+0xa0/0xa0 [ 1529.593975] ? pointer+0xa80/0xa80 [ 1529.594458] ? snprintf+0xbb/0x100 [ 1529.594941] proc_pid_readdir+0x3d3/0x830 [ 1529.595495] ? proc_pid_lookup+0x460/0x460 [ 1529.596040] ? inode_security+0x107/0x140 [ 1529.596622] proc_root_readdir+0xa0/0xd0 [ 1529.597145] iterate_dir+0x584/0x710 [ 1529.597648] __x64_sys_getdents64+0x13a/0x2c0 [ 1529.598228] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1529.598831] ? fput_many+0x2f/0x1a0 [ 1529.599297] ? fillonedir+0x4b0/0x4b0 [ 1529.599815] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1529.600523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1529.601186] do_syscall_64+0x33/0x40 [ 1529.601684] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1529.602342] RIP: 0033:0x7f33f1bc1b19 [ 1529.602839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1529.605237] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1529.606235] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1529.607169] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1529.608109] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.609047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1529.609976] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1529.610942] CPU: 1 PID: 8253 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1529.611055] hpet: Lost 2 RTC interrupts [ 1529.616908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1529.618466] Call Trace: [ 1529.618812] dump_stack+0x107/0x167 [ 1529.619290] should_fail.cold+0x5/0xa [ 1529.619782] ? create_object.isra.0+0x3a/0xa20 [ 1529.620380] should_failslab+0x5/0x20 [ 1529.620870] kmem_cache_alloc+0x5b/0x310 [ 1529.621395] create_object.isra.0+0x3a/0xa20 [ 1529.621951] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1529.622611] kmem_cache_alloc+0x159/0x310 [ 1529.623145] ? proc_free_inode+0x20/0x20 [ 1529.623666] proc_alloc_inode+0x18/0x200 [ 1529.624208] ? proc_free_inode+0x20/0x20 [ 1529.624726] alloc_inode+0x63/0x240 [ 1529.625193] new_inode+0x23/0x250 [ 1529.625640] proc_pid_make_inode+0x22/0x220 [ 1529.626198] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1529.626870] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1529.627605] proc_pid_instantiate+0x50/0x1e0 [ 1529.628196] proc_fill_cache+0x373/0x4a0 [ 1529.628756] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1529.629531] ? pid_update_inode+0xa0/0xa0 [ 1529.630059] ? pointer+0xa80/0xa80 [ 1529.630531] ? snprintf+0xbb/0x100 [ 1529.631006] proc_pid_readdir+0x3d3/0x830 [ 1529.631545] ? proc_pid_lookup+0x460/0x460 [ 1529.632191] ? inode_security+0x107/0x140 [ 1529.632734] proc_root_readdir+0xa0/0xd0 [ 1529.633261] iterate_dir+0x584/0x710 [ 1529.633742] __x64_sys_getdents64+0x13a/0x2c0 [ 1529.634328] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1529.634919] ? fput_many+0x2f/0x1a0 [ 1529.635391] ? fillonedir+0x4b0/0x4b0 [ 1529.635893] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1529.637325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1529.638002] do_syscall_64+0x33/0x40 [ 1529.638496] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1529.639162] RIP: 0033:0x7faf66c84b19 [ 1529.639650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1529.642041] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1529.643037] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1529.643950] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1529.645928] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.648056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1529.654181] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1529.676121] audit: type=1400 audit(1750241956.471:49): avc: denied { relabelto } for pid=8257 comm="syz-executor.4" name="RAW" dev="sockfs" ino=30678 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:traceroute_exec_t:s0 tclass=rawip_socket permissive=1 10:19:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) write$sndseq(r1, &(0x7f00000012c0)=[{0xaf, 0x9, 0x3f, 0x2, @time={0xfff}, {0xe8, 0x3}, {0x0, 0x6}, @time=@tick=0x200}, {0x6, 0x2, 0x4, 0x7c, @time={0x2, 0x20}, {0x1, 0x7}, {0x3f, 0xfc}, @queue={0x9, {0x6, 0x8d6}}}, {0x2, 0x1, 0x1, 0x4, @tick=0x4, {0x9, 0x4}, {0x9}, @quote={{0x1f, 0x3f}, 0x0, &(0x7f0000000040)={0x0, 0x80, 0x40, 0xee, @time={0x80000000, 0x8}, {0x5, 0x4e}, {0x6, 0x7}, @ext={0x1000, &(0x7f0000001e00)="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"}}}}, {0x7f, 0x81, 0xa8, 0x81, @tick=0x3f, {0x4, 0x7f}, {0x6, 0x81}, @note={0x0, 0x3f, 0x0, 0x8f, 0x8}}, {0xfe, 0x1, 0x6, 0x4, @tick=0x7fffffff, {0x3f, 0x40}, {0x0, 0x4}, @queue={0xb, {0x9, 0x2}}}, {0x7, 0xff, 0x81, 0x3, @time={0x8000, 0x69a551c8}, {0x3, 0x2}, {0xff, 0x2}, @connect={{0x80, 0xa0}, {0x0, 0x3}}}, {0x78, 0x80, 0xff, 0x54, @time={0x6, 0xffffffff}, {0x3a, 0x20}, {0xfd}, @raw32={[0x80000001, 0x6, 0x6]}}], 0xc4) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000001440), 0x400040, 0x0) perf_event_open(&(0x7f00000013c0)={0x4, 0x80, 0x73, 0x81, 0x80, 0xff, 0x0, 0x20, 0x1, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f0000000140), 0xc}, 0x80, 0x2, 0x9, 0x3, 0x4, 0xb47, 0x0, 0x0, 0x4, 0x0, 0x9159}, 0xffffffffffffffff, 0x8, r3, 0x0) getdents64(r2, &(0x7f0000000200)=""/4075, 0xfeb) 10:19:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) recvmmsg$unix(r0, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000200)=""/177, 0xb1}, {&(0x7f00000002c0)=""/202, 0xca}, {&(0x7f00000003c0)=""/240, 0xf0}, {&(0x7f00000004c0)=""/216, 0xd8}, {&(0x7f00000005c0)=""/224, 0xe0}, {&(0x7f00000006c0)=""/160, 0xa0}, {&(0x7f0000000780)}, {&(0x7f00000007c0)=""/121, 0x79}], 0x9, &(0x7f0000000840)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001940)=""/188, 0xbc}, {&(0x7f0000001a00)=""/218, 0xda}], 0x2}}], 0x2, 0x0, &(0x7f0000001bc0)={0x0, 0x3938700}) mount(&(0x7f0000001e80)=ANY=[@ANYBLOB="002f47c2236dc8726cb3f8fbb77412c6f4e6c0b48015de0b65512b7fd27fe550229652deddef0c9e36391d00c9aa447e5f4692c72e5396a970d47c"], &(0x7f0000001d40)='./file1\x00', &(0x7f0000001e00)='mqueue\x00', 0x200048, &(0x7f0000001e40)='&$f)\x00') statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r2, r3, 0x800) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x280000, &(0x7f0000001fc0)={'trans=unix,', {[{@version_u}, {@access_client}, {@cachetag={'cachetag', 0x3d, 'access=client'}}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@privport}, {@cachetag={'cachetag', 0x3d, 'proc\x00'}}], [{@smackfshat={'smackfshat', 0x3d, 'proc\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@euid_eq={'euid', 0x3d, r1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fsname={'fsname', 0x3d, '#+-.%'}}, {@dont_appraise}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\\'.-\xa9'}}, {@euid_gt={'euid>', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, '{&'}}]}}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000001f40)={&(0x7f0000000780), 0xc, &(0x7f0000001f00)={&(0x7f0000001ec0)={0x3c, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x1}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x20}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xfff7}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xd486}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008000}, 0x4880) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000001c00)='./file1\x00', 0x2, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001f80), 0x10000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:19:16 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1529.697553] loop3: detected capacity change from 0 to 135266304 10:19:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="67070000000000000036e24b37cac1e3d21bd5bdb1ea1f932202e2bd199cc66c21c7dc08b16635657c6d7911995531ef2bc907440370f500000000b528770f1e4bc484503b7482"], 0x40) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) r5 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r6}}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index=0xa, 0xffffffffffffffc0, 0x0, 0x7, 0x3, 0x1, {0x0, r6}}, 0xfffffff9) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x88080, 0x68) openat(r8, &(0x7f0000000140)='./file0\x00', 0x2001, 0x0) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) [ 1540.328403] hpet: Lost 1 RTC interrupts 10:19:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x100000, &(0x7f0000000340)=ANY=[@ANYBLOB="726f63002c6e616d653d70726f63002c646576696365732c6e616d653d2c5a6f7072656669782c6e616d653d2c6e6f6e652c6e6f6e652c66736e616d834c653d2c00"/79]) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='./file0\x00') 10:19:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x400, 0x2) 10:19:30 executing program 2: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001e0001000000000000000400fe8800000000000000000000000000010000000000000000ac14140969030cbadd65cdf4a275c20e1d87bb000000000000000000000000000000000000000008000c0000000000"], 0x48}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="67070000000000000036e24b37cac1e3d21bd5bdb1ea1f932202e2bd199cc66c21c7dc08b16635657c6d7911995531ef2bc907440370f5d8aab7dcb528770f1e4bc484503b7482"], 0x40) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000140)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r5, 0x80, &(0x7f0000000200)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x4}, 0x0, 0x0, 0x0, {0x0, r6}}, 0xfffff01d) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) 10:19:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0xfe, 0x0, 0x0, 0x62, 0x82006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff7f, 0x1}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="040000000020000000"]) connect$inet(r2, &(0x7f0000000240)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280), 0x4000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r4, 0x8010661b, &(0x7f00000002c0)) mkdirat(r3, &(0x7f00000001c0)='./file0\x00', 0x150) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000300)={'wg2\x00', 0x0}) [ 1543.532597] FAULT_INJECTION: forcing a failure. [ 1543.532597] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.535885] FAULT_INJECTION: forcing a failure. [ 1543.535885] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.537811] CPU: 1 PID: 8287 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1543.539966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.541069] Call Trace: [ 1543.541422] dump_stack+0x107/0x167 [ 1543.541904] should_fail.cold+0x5/0xa [ 1543.542404] ? security_inode_alloc+0x34/0x160 [ 1543.543004] should_failslab+0x5/0x20 [ 1543.543514] kmem_cache_alloc+0x5b/0x310 [ 1543.544044] security_inode_alloc+0x34/0x160 [ 1543.552640] inode_init_always+0xa4e/0xd10 [ 1543.553184] ? proc_free_inode+0x20/0x20 [ 1543.553727] alloc_inode+0x84/0x240 [ 1543.554194] new_inode+0x23/0x250 [ 1543.554664] proc_pid_make_inode+0x22/0x220 [ 1543.555214] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1543.555974] proc_pid_instantiate+0x50/0x1e0 [ 1543.556579] proc_fill_cache+0x373/0x4a0 [ 1543.557098] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1543.557884] ? pid_update_inode+0xa0/0xa0 [ 1543.558422] ? pointer+0xa80/0xa80 [ 1543.558897] ? snprintf+0xbb/0x100 [ 1543.559373] proc_pid_readdir+0x3d3/0x830 [ 1543.559919] ? proc_pid_lookup+0x460/0x460 [ 1543.560491] ? inode_security+0x107/0x140 [ 1543.561042] proc_root_readdir+0xa0/0xd0 [ 1543.561589] iterate_dir+0x584/0x710 [ 1543.562072] __x64_sys_getdents64+0x13a/0x2c0 [ 1543.562669] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1543.563253] ? fput_many+0x2f/0x1a0 [ 1543.563742] ? fillonedir+0x4b0/0x4b0 [ 1543.564249] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1543.568853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1543.569535] do_syscall_64+0x33/0x40 [ 1543.570014] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.570696] RIP: 0033:0x7faf66c84b19 [ 1543.571173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.573598] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1543.574594] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1543.575555] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1543.576503] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.577431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1543.578357] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1543.579320] CPU: 0 PID: 8293 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1543.580339] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.581405] Call Trace: [ 1543.581630] loop3: detected capacity change from 0 to 135266304 [ 1543.581754] dump_stack+0x107/0x167 [ 1543.582976] should_fail.cold+0x5/0xa [ 1543.583469] ? proc_alloc_inode+0x18/0x200 [ 1543.584008] should_failslab+0x5/0x20 [ 1543.584636] kmem_cache_alloc+0x5b/0x310 [ 1543.585151] ? proc_free_inode+0x20/0x20 [ 1543.585715] proc_alloc_inode+0x18/0x200 [ 1543.586228] ? proc_free_inode+0x20/0x20 [ 1543.586751] alloc_inode+0x63/0x240 [ 1543.587218] new_inode+0x23/0x250 [ 1543.587665] proc_pid_make_inode+0x22/0x220 [ 1543.588247] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1543.589007] proc_pid_instantiate+0x50/0x1e0 [ 1543.589647] proc_fill_cache+0x373/0x4a0 [ 1543.590161] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1543.590923] ? pid_update_inode+0xa0/0xa0 [ 1543.591449] ? pointer+0xa80/0xa80 [ 1543.591922] ? snprintf+0xbb/0x100 [ 1543.592550] proc_pid_readdir+0x3d3/0x830 [ 1543.593080] ? proc_pid_lookup+0x460/0x460 [ 1543.593661] ? inode_security+0x107/0x140 [ 1543.594195] proc_root_readdir+0xa0/0xd0 [ 1543.594714] iterate_dir+0x584/0x710 [ 1543.595194] __x64_sys_getdents64+0x13a/0x2c0 [ 1543.595765] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1543.596487] ? fput_many+0x2f/0x1a0 [ 1543.596945] ? fillonedir+0x4b0/0x4b0 [ 1543.597441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1543.598119] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1543.598810] do_syscall_64+0x33/0x40 [ 1543.599308] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.599958] RIP: 0033:0x7f33f1bc1b19 [ 1543.600455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.602942] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1543.603993] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1543.605011] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1543.605913] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.606854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 sendmmsg(r0, &(0x7f0000005500)=[{{&(0x7f0000000340)=@ll={0x11, 0x18, r6, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="ce2d5efa5595d151d6b8", 0xa}], 0x1, &(0x7f0000000440)}}, {{&(0x7f0000000480)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x8000}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000500)="fd84eafceccb3a15ad503bf2f280b849ac9e40a64e", 0x15}, {&(0x7f0000000540)="3156605008bb5f69a15dca88c54436a52e5830ad2748b698660a0764b4344d193ca616fcd7a5329ba258d020485dc07032110ee49ec58f244cf2677bb018b09248b4778c032dd7561bd6b578a5cb06373e8b7a31ff59818438218b8b4c1ac8d8615ed62e0701f2635e56339eb195ac479fc86f6a4e386fd78209b834af5c6ab3668978f9a0f5ea121fcbfca9ee68d1a7cff38f289dc4638a730aa7dbcdf3ba1fe8bdd5e3c6b7bd86837e46452d50ff334c13af772ca69250b15cddcb1baaa2e7c035c5e96fd0fdee24d4662edd3a210fbc6793bcae623869a083e0e11736133614991239cb13e370949ede991887d6bc21e2731e94", 0xf5}, {&(0x7f0000000640)="44ea0569931b6792e38be16e459170eb2c8ab7f19a4663b881f4ec95930c57d78cc6c591bc14b435fbbf54b824bd7e55828d7cf37f8a395335f06233f1395a34bcdb5e2cd852733d30db7139c3b3bba7004dfad12a38809486314eabdff7bc6e2cbddb462e351b53029a86421518da3b6a0683e1fb774bd0b723177c97f95db86b514bfab5b1f3411cfe3be98390591ebf9f1316d04b03a3e6908e8103606e9944cb7b31eabee74183d8e53ef5f57e25f0c77e2754e69cb349b26cc4456b582c0fc84a1e6bdf", 0xc6}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000002e00)="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", 0x1000}, {&(0x7f0000000740)="c37d8a67bb14c6be1fba2d76d74d206b2ce1a13c31cd5c96111c43c7c211f3df1ae4020581effa6dc32ff76c878fa6b715283ad9cc1f56842a4064f3a468433fb6b37ab99b54bc047ca8b63587fcf53311ee41fa48133222e019d249b081cb8a53e5a8877778227bf018926e541fe3a6e62b57db9da789369e86a3a47f28423515d6d96689e60d419e7df99ea62ebb1982b498559209973e3cdbd411f5c9399034939a52a3290155ecec56a6618663fc69aa060e6dd8eb89ec63cd0e823097a7713a580ef28e8172eb05b89a3a6d0df065bfdb", 0xd3}, {&(0x7f0000003e00)="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", 0x1000}], 0x7, &(0x7f0000001900)=[{0x88, 0x110, 0x79b0, "47f337f264119e60b7787997f53923f6067d3bef7af61167f0a928b34be8ad7bbe7882079c1cb9c5ef6d1bda54ec95b4803c30ec06d3473ca1255261f7bfa786442d1cd6cb50725b31f095e50029d82678d2691d674e860561eed68df6b4580c78e51dcf48182401f63434a59445fe3cb715896e573256"}, {0xd8, 0x3a, 0x3, "902d7575bf32a303e4d83880e634008d55c8757d066a08b6ccefd212ec80406f5bc5a18da9d0a959fa0f080095f830cbe28ff90253c5c7de746038b38bc22b28c116388719a457279c88c5d349a535a54dcf7221a6adbe90c0a44aa94ab109ee79ec13f9d534c753b0d4a220cf5e3a751a95ba5a591feedd937279daab6ff4034d791ea6a6b1acafe9969229655827a7258a18d134bb4669ce7b6a036afbe36aa859042b9ca07c37121373e491a5ecbf1545a7fcdc39a6f6e98a599c8a9364c8142afcfeffb013a0"}, {0xd8, 0x113, 0x81, "eb5cd4715b1ee781bf9d3b550caa659808fc40e80fc4cb87db12fa513058b071e9fea301c5bc8e696e8bfc41ad2629cc3a1bbbbc8b22912470b21b7a043109b73a2f128da2bf25e3aac0395b942b012f1ba62c9221e1a612a55302241994812453d90c0c52016087f519b8a18eeb77c4bd853c187ec7c04d794b73c4cbd0db059ad26ef3e0d25c00fa8a1642b171b3b44d3be5ee2bf0bdf37f01335c6500f081320aadef6944916aaf265b31c4b3a9b5b15e81cfdf02c1837a5ea88aa28c918ebfc2"}, {0x60, 0x101, 0x12c0, "8028114f830738ca775331ea74b5480dc1ba008f1775e92d47124eda3d59bab6a08e7bbf489b60f774f4e4df649f936f5d932e831743709a5f927dc1fefc3899614c144cebf21321a4b5"}], 0x298}}, {{0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000001bc0)="a970ecea10c210b33557d073d437f5cd2bafee111c9f107bff220c3971992cfc1377bde00fec1a51cbf6f74996dafd5a299561022388c04ebbd1380bc5b1924fb520081b69aed85b6ab1cce741e8dd9a4855cf4140f795a68531d0ce", 0x5c}, {&(0x7f0000001c40)="aa1b744de49f967ee8cc941304f240459b383dd653cb19524335fa176b0b27eeba1e56f2b1ddfd03aa73c0718e21068e9951db64a7ff72452762e0f23ec1beb6fc7a78", 0x43}, {&(0x7f0000000840)="17b64d46a5876aa1da13ab3317ea61074ac2fd353aa5cc23d71e3df83eb8d1f3ceb0837b8042aad687af1d42880eb064", 0x30}, {&(0x7f0000001cc0)="8c8287696ff7b314d68e6c0f31c1760b6669f7325882463a200a431819a96cd5f38739a34b16ce6d55a7b5e3c755f67e1c87204d129527c0fc26a7fffe83a6a1582217e5b87b34d207d2a5d89b763c9b0e63eb21636e982bad261797acd1cf358799bd021e1e9de8b7fd07bd210b097fecf62645b52a4a9b4bf60817e03436b46d6503fc40f25ac798ec5695fdcf61043282737ef455c97ec5d731d80730bbef9ae80f1836fcf77fca4bcb7912f0fcfd036e56ab970c560a", 0xb8}, {&(0x7f0000004e00)="1393840fa8fe76e48b23a22ae1725ee8b6a85ff93a401b81802939837381b791bbbdf0653098b96a523a7ce0ad7da20acb33644bbc874b7d563dd68b6c79dd2de4c1b1c13085aedca8aac608e128ef7878f4f62445dfe8b34c1c19ad6573575e4b11f344f06a0ff39abeea1105fde588c806ce3972d471db9ea0e2614f9566f739ea00206dd14d7294025aa3e97bfcb6be74e7b1eeb4a7fd543f7331d4608391ee74fb6eb090f3434fc1f6ddf6bfdbaa2fda1d6c2fc7045abbfe56b7ff34cb4af2b0342cae3591afb741da86f40b38e119d9f0e76c0b3ed8d73336c0857687fe73350e4a60263ebb", 0xe8}, {&(0x7f0000004f00)="51ddf582b841c5218286e69132a5f2335621142c4eef01d23fb8ce3c7a1c5d2a", 0x20}, {&(0x7f0000004f40)="696651c16cdf7a5aca5e2673003d7336429f28ae3e067f6c11e9ad7e6ce39ee8cf9c30523cd832c4acbe5c", 0x2b}, {&(0x7f0000004f80)="19eb54f5d5e486a880b79fb7897e2c90a9c26b8f0ae1c55c", 0x18}, {&(0x7f0000004fc0)="3dfeae385f5abd8c9777eb391e8725d126750ad21628deb04c8e63c7408a96f1799475d295441de7479013c8cb6eac7a3efe76bf20598d4e38eb079b839cee14f7481bb178e57289ac1b780aa03e703c106c4cf3880763cc93c2afea07d51a88259bd20731fe0002f3c4d946f25fb601a7a5d2cdc40da7eaae1148a6b2483655dec14c699a831bb237df9d8092408e232491526808c8571c5f99e972aa59c4125f1f53b14cff040c1a641394560920a39350c48f1c0d1e1be96ffa0b522baef5822f47a7c5a70333804686f8204ddf5dc69f19cdc8d55f8dd79df80f423802df90dd0248eaa87619a8a3610d2b731bd3c4f4588afee2", 0xf6}, {&(0x7f00000050c0)="08c5e183abef0e4a4e96d536f1f5ab7f238ff16d5aacd68261a1d819d1b8a54340d7e4745fa2a7524fae8d4698df6f6c0a7fc9f7d8440043b311568013e627b37af55f8553ba2ad17cd4012b9a37ba32fa9cc9cc084acbbca10f2493a0d5ea02a1129d4f802624882d86f958fc5fc118a4b6f4da71e40d22e485e30d2ee389cbfa9212b9c7d191a04787341d5a749e24991268138496a8eae11cf052167fd171acc74e6e46e78b776304843c684be80ad49557233a4c0761211531a70bdbaf3bf48180c41e0e7a5f92a77c8e50d9", 0xce}], 0xa, &(0x7f0000005280)=[{0xf8, 0x105, 0x3fe0000, "4d59376e642c8cb835fad5d9533f5d5d000dac42706977bec4a8fd5425df2b2e5b6dc4e39411054d79b627afab130eb2a6d0db049952e8692aa878f2e2615a5cfc40906f6cc8240afcf562de4b501458cef17ede64e1708c54d1bc912c2e687ba0bf4658fbbc84025dd633296f6c67dcfd97009ddf3cf271b44fa865abed05c7c514bff8febdff88c96ad96f7e512d6c62eddb302474514c9993009c2136acab507b6cf67f70625ea298b71b282a162a1adfc35e816642108f1607a88daaa9ac892b34950502998df1059394d5c4a02cedeab6678ddf82f8f8c3578d8c9f35deabbabe9c2c"}, {0x88, 0x29, 0x20, "143b74df7a1fb52031606b89353b887a563f566fefde9c1ff92da451b78418c4ead9c9aef24fb04a8862dda1ab5cbdf7ea7f569c357bd7dd185949532aeb45926e021bedb4b5999d3e4644bdca2ff722a0db2e3048476a99714f3e9ae595dba28338b0bc4c26eba915c32ab4abddebf5c700c117"}, {0xe0, 0x8, 0x9, "169048f7b560310cd42335e4c2788449ce4a3dbf4a24df57a19884eb54062c53aa9381e96b43f34136f670ad3ad2508fc71ca49c4721463400a619b6cf4564cec471a611b4ee372e0e51c9a50f3e48b13b90138c64173242c565dba625f4009e4fcd552f00292635abafa2ceff8706e7b3040b257ebdaf89eb604d8362af990e114be556291735751332d9c90627f43cb10cc0fda8657dc5fdd45f218cbf53db0598c87d3ce97fbbd089f5c48b39480f967ec7144e0d9f46ec9367918d41a290e83dddf8f34a01552fd9273a"}], 0x260}}], 0x3, 0x40c0) fallocate(r0, 0x30, 0x9, 0x7f) 10:19:30 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:19:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 9) 10:19:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 11) 10:19:30 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000040)=0x1) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x108) [ 1543.607755] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1543.608924] hpet: Lost 1 RTC interrupts 10:19:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 12) 10:19:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:19:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x100, 0x0, 0x0, 0x22cb508, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x210042, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:19:30 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) getdents64(r0, &(0x7f0000000140)=""/179, 0xb3) 10:19:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) recvmmsg$unix(r4, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x3, r4, &(0x7f0000000340)="a3dc178957321905d79518029d6cbcc7e7aafd652edee1010bdae313d05fe87556b365a597d6fe121ca7257a0bb236014996be9dfce8ee05b803fbb0cf2bc40d170bb106bf791e3b7c955d87fb3448cccb5872476b33187ce245fa2c5d72ebca13aa8916cb7004973c97e7059d9c856cb7474cdc009850e09f304670d0384e8cff88d9508a21fc84e1ad5283", 0x8c, 0xfffffffffffffff8, 0x0, 0x0, r2}]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r6, &(0x7f0000000880)=""/4096, 0x1000) 10:19:30 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1543.775954] loop3: detected capacity change from 0 to 135266304 [ 1543.836961] FAULT_INJECTION: forcing a failure. [ 1543.836961] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.838527] CPU: 1 PID: 8322 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1543.839405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1543.840478] Call Trace: [ 1543.840826] dump_stack+0x107/0x167 [ 1543.841297] should_fail.cold+0x5/0xa [ 1543.841792] ? create_object.isra.0+0x3a/0xa20 [ 1543.842385] should_failslab+0x5/0x20 [ 1543.842880] kmem_cache_alloc+0x5b/0x310 [ 1543.843406] create_object.isra.0+0x3a/0xa20 [ 1543.843974] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1543.852651] kmem_cache_alloc+0x159/0x310 [ 1543.853197] security_inode_alloc+0x34/0x160 [ 1543.853769] inode_init_always+0xa4e/0xd10 [ 1543.854315] ? proc_free_inode+0x20/0x20 [ 1543.854841] alloc_inode+0x84/0x240 [ 1543.855311] new_inode+0x23/0x250 [ 1543.855764] proc_pid_make_inode+0x22/0x220 [ 1543.856340] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1543.857087] proc_pid_instantiate+0x50/0x1e0 [ 1543.857654] proc_fill_cache+0x373/0x4a0 [ 1543.858178] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1543.858949] ? pid_update_inode+0xa0/0xa0 [ 1543.859483] ? pointer+0xa80/0xa80 [ 1543.859949] ? snprintf+0xbb/0x100 [ 1543.860443] proc_pid_readdir+0x3d3/0x830 [ 1543.860985] ? proc_pid_lookup+0x460/0x460 [ 1543.861529] ? inode_security+0x107/0x140 [ 1543.862076] proc_root_readdir+0xa0/0xd0 [ 1543.862604] iterate_dir+0x584/0x710 [ 1543.863090] __x64_sys_getdents64+0x13a/0x2c0 [ 1543.863671] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1543.868277] ? fput_many+0x2f/0x1a0 [ 1543.868748] ? fillonedir+0x4b0/0x4b0 [ 1543.869246] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1543.869926] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1543.870589] do_syscall_64+0x33/0x40 [ 1543.871077] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1543.871735] RIP: 0033:0x7faf66c84b19 [ 1543.872217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1543.882590] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1543.883570] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1543.884504] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1543.885420] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.886334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1543.887249] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:19:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 10) 10:19:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 13) 10:19:45 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$mouse(&(0x7f00000001c0), 0x7fffffff, 0x2e0c00) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {r0}}, './file0/file0\x00'}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r4, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r5, &(0x7f0000000100)=0xfffffffffffff674, r6, 0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f0000000440)=ANY=[@ANYBLOB="c80100002801000128bd7000fcdbdf2504000000880023802aa0fb81013e182e603ef9c198a1fa0bcdf214065cc25d579e49147ad526875fe84269ed9fb07b03831af8991ad5986a05a0fe76c37226746c3fdc51146cd1e47108f5fe772b2bb3234bc4ebba1a9825d6b9330898f47f5e60b1882c4703bb5472026fd2d5a8b52d4b71814fe96e81efab2f580d122ef4435a118f344f50588d7c7a4b3895008d8008002900", @ANYRES32=r6, @ANYBLOB="08008a00", @ANYRES32=0xee00, @ANYBLOB="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"], 0x1c8}, 0x1, 0x0, 0x0, 0x40}, 0x11) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) copy_file_range(r3, &(0x7f0000000240)=0xba1, r1, &(0x7f0000000340)=0xfffffffffffffffe, 0xf2, 0x0) rename(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00') mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180), 0x5000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) 10:19:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 10:19:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x2, 0x1f, 0xb6, 0x4, 0x0, 0x81, 0xa0c, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xaa8, 0x2, @perf_config_ext={0x3f, 0x81}, 0x250, 0x8, 0x3ff, 0x2, 0x400, 0x972, 0x0, 0x0, 0xee, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xd, r1, 0x3) 10:19:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x26000, 0x0) write$selinux_attr(r1, &(0x7f0000000140)='system_u:object_r:udev_exec_t:s0\x00', 0x21) 10:19:45 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:19:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x31, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x4}}}}, 0xfffffffffffffe5b) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x8, 0xe1, 0xfa, 0x0, 0x6, 0x50c1, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x101, 0x6}, 0x2000, 0x7f, 0xfffffb88, 0x5, 0xfffffffffffffffe, 0x3, 0x5, 0x0, 0x80, 0x0, 0xffff}, 0x0, 0xc, r1, 0x8) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1558.849270] FAULT_INJECTION: forcing a failure. [ 1558.849270] name failslab, interval 1, probability 0, space 0, times 0 [ 1558.852261] CPU: 0 PID: 8338 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1558.854443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1558.865052] Call Trace: [ 1558.865854] dump_stack+0x107/0x167 [ 1558.866993] should_fail.cold+0x5/0xa [ 1558.867331] FAULT_INJECTION: forcing a failure. [ 1558.867331] name failslab, interval 1, probability 0, space 0, times 0 [ 1558.868166] ? create_object.isra.0+0x3a/0xa20 [ 1558.868183] should_failslab+0x5/0x20 [ 1558.868197] kmem_cache_alloc+0x5b/0x310 [ 1558.868215] create_object.isra.0+0x3a/0xa20 [ 1558.868234] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1558.878026] kmem_cache_alloc+0x159/0x310 [ 1558.879113] ? proc_free_inode+0x20/0x20 [ 1558.880161] proc_alloc_inode+0x18/0x200 [ 1558.880896] ? proc_free_inode+0x20/0x20 [ 1558.881545] alloc_inode+0x63/0x240 [ 1558.882101] new_inode+0x23/0x250 [ 1558.882688] proc_pid_make_inode+0x22/0x220 [ 1558.883345] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1558.884219] proc_pid_instantiate+0x50/0x1e0 [ 1558.884899] proc_fill_cache+0x373/0x4a0 [ 1558.885546] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1558.886476] ? pid_update_inode+0xa0/0xa0 [ 1558.887106] ? pointer+0xa80/0xa80 [ 1558.887658] ? snprintf+0xbb/0x100 [ 1558.888247] proc_pid_readdir+0x3d3/0x830 [ 1558.888888] ? proc_pid_lookup+0x460/0x460 [ 1558.889581] ? inode_security+0x107/0x140 [ 1558.890219] proc_root_readdir+0xa0/0xd0 [ 1558.890841] iterate_dir+0x584/0x710 [ 1558.891413] __x64_sys_getdents64+0x13a/0x2c0 [ 1558.892099] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1558.896817] ? fput_many+0x2f/0x1a0 [ 1558.897376] ? fillonedir+0x4b0/0x4b0 [ 1558.897966] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1558.898767] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1558.899547] do_syscall_64+0x33/0x40 [ 1558.900116] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1558.900907] RIP: 0033:0x7f33f1bc1b19 [ 1558.901486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1558.904211] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1558.905289] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1558.906201] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1558.907132] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1558.908074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1558.909022] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1558.909983] CPU: 1 PID: 8333 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1558.911960] hpet: Lost 3 RTC interrupts [ 1558.911969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1558.911979] Call Trace: [ 1558.915930] dump_stack+0x107/0x167 [ 1558.917023] should_fail.cold+0x5/0xa [ 1558.918178] ? __d_alloc+0x2a/0x990 [ 1558.919289] should_failslab+0x5/0x20 [ 1558.920448] kmem_cache_alloc+0x5b/0x310 [ 1558.921661] ? mark_lock+0xf5/0x2df0 [ 1558.922771] __d_alloc+0x2a/0x990 [ 1558.923789] ? lock_acquire+0x197/0x470 [ 1558.925008] d_alloc_parallel+0x111/0x1bc0 [ 1558.926297] ? lock_downgrade+0x6d0/0x6d0 [ 1558.927501] ? find_held_lock+0x2c/0x110 [ 1558.932712] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1558.933570] loop3: detected capacity change from 0 to 135266304 [ 1558.933964] ? __d_lookup+0x3bf/0x760 [ 1558.933985] ? lockdep_init_map_type+0x2c7/0x780 [ 1558.937152] ? lockdep_init_map_type+0x2c7/0x780 [ 1558.940698] proc_fill_cache+0x2f6/0x4a0 [ 1558.941211] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1558.941961] ? pid_update_inode+0xa0/0xa0 [ 1558.942483] ? pointer+0xa80/0xa80 [ 1558.942936] ? snprintf+0xbb/0x100 [ 1558.943403] proc_pid_readdir+0x3d3/0x830 [ 1558.943937] ? proc_pid_lookup+0x460/0x460 [ 1558.944485] ? inode_security+0x107/0x140 [ 1558.945112] proc_root_readdir+0xa0/0xd0 [ 1558.945714] iterate_dir+0x584/0x710 [ 1558.946266] __x64_sys_getdents64+0x13a/0x2c0 [ 1558.946912] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1558.947578] ? fput_many+0x2f/0x1a0 [ 1558.948103] ? fillonedir+0x4b0/0x4b0 [ 1558.948681] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1558.949476] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1558.950214] do_syscall_64+0x33/0x40 [ 1558.950796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1558.951535] RIP: 0033:0x7faf66c84b19 [ 1558.952678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1558.965295] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1558.967588] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1558.973252] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1558.975391] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1558.977528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1558.979652] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:19:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 11) 10:19:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r2, 0x0, r1, 0x2) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x40, 0x0, 0x82, 0x8, 0x0, 0x1, 0x40, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x6, @perf_config_ext={0x2, 0x7e8b}, 0xe400, 0x3, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x460}, r2, 0x10, r0, 0x1) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:19:45 executing program 2: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0/file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file1\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x3022c02, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1559.212261] FAULT_INJECTION: forcing a failure. [ 1559.212261] name failslab, interval 1, probability 0, space 0, times 0 [ 1559.214807] CPU: 0 PID: 8368 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1559.216877] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1559.219455] Call Trace: [ 1559.220220] dump_stack+0x107/0x167 [ 1559.221318] should_fail.cold+0x5/0xa [ 1559.222463] ? security_inode_alloc+0x34/0x160 [ 1559.223847] should_failslab+0x5/0x20 [ 1559.225025] kmem_cache_alloc+0x5b/0x310 [ 1559.226261] security_inode_alloc+0x34/0x160 [ 1559.227582] inode_init_always+0xa4e/0xd10 [ 1559.228848] ? proc_free_inode+0x20/0x20 [ 1559.230065] alloc_inode+0x84/0x240 [ 1559.231166] new_inode+0x23/0x250 [ 1559.232215] proc_pid_make_inode+0x22/0x220 [ 1559.233541] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1559.235109] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1559.236842] proc_pid_instantiate+0x50/0x1e0 [ 1559.238155] proc_fill_cache+0x373/0x4a0 [ 1559.239365] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1559.241202] ? pid_update_inode+0xa0/0xa0 [ 1559.242471] ? pointer+0xa80/0xa80 [ 1559.243534] ? snprintf+0xbb/0x100 [ 1559.244602] proc_pid_readdir+0x3d3/0x830 [ 1559.245853] ? proc_pid_lookup+0x460/0x460 [ 1559.247113] ? inode_security+0x107/0x140 [ 1559.248373] proc_root_readdir+0xa0/0xd0 [ 1559.249645] iterate_dir+0x584/0x710 [ 1559.250757] __x64_sys_getdents64+0x13a/0x2c0 [ 1559.252120] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1559.253558] ? fput_many+0x2f/0x1a0 [ 1559.254694] ? fillonedir+0x4b0/0x4b0 [ 1559.255877] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1559.257471] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1559.259032] do_syscall_64+0x33/0x40 [ 1559.260000] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1559.261340] RIP: 0033:0x7f33f1bc1b19 [ 1559.262271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1559.267578] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1559.269874] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1559.272003] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1559.274179] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1559.276363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1559.278508] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 [ 1559.280986] hpet: Lost 3 RTC interrupts [ 1566.008609] hpet: Lost 1 RTC interrupts 10:20:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 12) 10:20:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_vif\x00') dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r3, 0xf50f, 0x0) dup3(r1, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:20:00 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) dup3(r2, r0, 0x80000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:20:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x62, 0x98ea4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x1800, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1573.529590] FAULT_INJECTION: forcing a failure. [ 1573.529590] name failslab, interval 1, probability 0, space 0, times 0 [ 1573.531606] CPU: 1 PID: 8372 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1573.532493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1573.537575] Call Trace: [ 1573.537930] dump_stack+0x107/0x167 [ 1573.538409] should_fail.cold+0x5/0xa [ 1573.538913] ? create_object.isra.0+0x3a/0xa20 [ 1573.539508] should_failslab+0x5/0x20 [ 1573.540010] kmem_cache_alloc+0x5b/0x310 [ 1573.540549] create_object.isra.0+0x3a/0xa20 [ 1573.541143] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1573.541820] kmem_cache_alloc+0x159/0x310 [ 1573.542380] security_inode_alloc+0x34/0x160 [ 1573.542964] inode_init_always+0xa4e/0xd10 [ 1573.543526] ? proc_free_inode+0x20/0x20 [ 1573.544069] alloc_inode+0x84/0x240 [ 1573.544549] new_inode+0x23/0x250 [ 1573.545037] proc_pid_make_inode+0x22/0x220 [ 1573.545614] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1573.546307] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1573.547056] proc_pid_instantiate+0x50/0x1e0 [ 1573.547643] proc_fill_cache+0x373/0x4a0 [ 1573.548183] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1573.548992] ? pid_update_inode+0xa0/0xa0 [ 1573.549540] ? pointer+0xa80/0xa80 [ 1573.550033] ? snprintf+0xbb/0x100 [ 1573.550524] proc_pid_readdir+0x3d3/0x830 [ 1573.551083] ? proc_pid_lookup+0x460/0x460 [ 1573.551646] ? inode_security+0x107/0x140 [ 1573.552203] proc_root_readdir+0xa0/0xd0 [ 1573.556776] iterate_dir+0x584/0x710 [ 1573.557282] __x64_sys_getdents64+0x13a/0x2c0 [ 1573.557881] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1573.558480] ? fput_many+0x2f/0x1a0 [ 1573.558960] ? fillonedir+0x4b0/0x4b0 [ 1573.559473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1573.560175] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1573.560884] do_syscall_64+0x33/0x40 [ 1573.561380] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1573.562055] RIP: 0033:0x7f33f1bc1b19 [ 1573.562550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1573.564983] RSP: 002b:00007f33ef137188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1573.565985] RAX: ffffffffffffffda RBX: 00007f33f1cd4f60 RCX: 00007f33f1bc1b19 [ 1573.566914] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1573.567841] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1573.576732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1573.577598] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 10:20:00 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x181c80, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) r4 = dup3(r3, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x25, &(0x7f00000001c0)={@empty, @empty, @private=0xa010102}, 0xc) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="05000000000000b60100"/22]) 10:20:00 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 14) 10:20:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0xffffffffffffff6d, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x62, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x21, 0x80000000005, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xa0, 0x76a93aa512285cbd, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x598, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1573.611486] loop3: detected capacity change from 0 to 135266304 [ 1573.638058] FAULT_INJECTION: forcing a failure. [ 1573.638058] name failslab, interval 1, probability 0, space 0, times 0 [ 1573.639841] CPU: 1 PID: 8388 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1573.640756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1573.641810] Call Trace: [ 1573.642154] dump_stack+0x107/0x167 [ 1573.642616] should_fail.cold+0x5/0xa [ 1573.643103] ? create_object.isra.0+0x3a/0xa20 [ 1573.643697] should_failslab+0x5/0x20 [ 1573.644185] kmem_cache_alloc+0x5b/0x310 [ 1573.652738] create_object.isra.0+0x3a/0xa20 [ 1573.653309] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1573.653965] kmem_cache_alloc+0x159/0x310 [ 1573.654499] ? mark_lock+0xf5/0x2df0 [ 1573.654984] __d_alloc+0x2a/0x990 [ 1573.655429] ? lock_acquire+0x197/0x470 [ 1573.655941] d_alloc_parallel+0x111/0x1bc0 [ 1573.656486] ? lock_downgrade+0x6d0/0x6d0 [ 1573.665028] ? find_held_lock+0x2c/0x110 [ 1573.665560] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1573.666089] ? __d_lookup+0x3bf/0x760 [ 1573.666582] ? lockdep_init_map_type+0x2c7/0x780 [ 1573.667194] ? lockdep_init_map_type+0x2c7/0x780 [ 1573.667805] proc_fill_cache+0x2f6/0x4a0 [ 1573.668330] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1573.669120] ? pid_update_inode+0xa0/0xa0 [ 1573.669651] ? pointer+0xa80/0xa80 [ 1573.670116] ? snprintf+0xbb/0x100 [ 1573.670591] proc_pid_readdir+0x3d3/0x830 [ 1573.671133] ? proc_pid_lookup+0x460/0x460 [ 1573.671672] ? inode_security+0x107/0x140 [ 1573.672217] proc_root_readdir+0xa0/0xd0 [ 1573.676751] iterate_dir+0x584/0x710 [ 1573.677240] __x64_sys_getdents64+0x13a/0x2c0 [ 1573.677816] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1573.678398] ? fput_many+0x2f/0x1a0 [ 1573.678864] ? fillonedir+0x4b0/0x4b0 [ 1573.679357] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1573.680031] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1573.680716] do_syscall_64+0x33/0x40 [ 1573.681196] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1573.681848] RIP: 0033:0x7faf66c84b19 [ 1573.682330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1573.692691] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1573.693667] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1573.694580] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1573.695493] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1573.696408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1573.697356] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:20:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 13) 10:20:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x6}}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'vlan0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="1200000002000000090000b403000000"]}) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:20:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x41, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) 10:20:00 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1573.799145] FAULT_INJECTION: forcing a failure. [ 1573.799145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1573.805057] CPU: 0 PID: 8402 Comm: syz-executor.7 Not tainted 5.10.238 #1 [ 1573.805934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1573.806993] Call Trace: [ 1573.807336] dump_stack+0x107/0x167 [ 1573.807804] should_fail.cold+0x5/0xa [ 1573.808299] _copy_to_user+0x2e/0x180 [ 1573.808810] simple_read_from_buffer+0xcc/0x160 [ 1573.809413] proc_fail_nth_read+0x198/0x230 [ 1573.809964] ? proc_sessionid_read+0x230/0x230 [ 1573.810553] ? security_file_permission+0xb1/0xe0 [ 1573.811175] ? proc_sessionid_read+0x230/0x230 [ 1573.811761] vfs_read+0x228/0x620 [ 1573.812210] ksys_read+0x12d/0x260 [ 1573.812691] ? vfs_write+0xb10/0xb10 [ 1573.813178] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1573.813852] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1573.814514] do_syscall_64+0x33/0x40 [ 1573.814988] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1573.815647] RIP: 0033:0x7f33f1b7469c [ 1573.816124] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1573.818489] RSP: 002b:00007f33ef137170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1573.819464] RAX: ffffffffffffffda RBX: 0000000000000798 RCX: 00007f33f1b7469c [ 1573.820367] RDX: 000000000000000f RSI: 00007f33ef1371e0 RDI: 0000000000000006 [ 1573.821312] RBP: 00007f33ef1371d0 R08: 0000000000000000 R09: 0000000000000000 [ 1573.822223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1573.823133] R13: 00007ffe97a5a74f R14: 00007f33ef137300 R15: 0000000000022000 10:20:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0x6}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) socket$nl_generic(0x10, 0x3, 0x10) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1573.888087] loop3: detected capacity change from 0 to 135266304 [ 1574.952718] hpet: Lost 1 RTC interrupts [ 1575.100646] hpet: Lost 4 RTC interrupts [ 1581.204834] hpet: Lost 2 RTC interrupts 10:20:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x800, 0x84) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r0, r1, 0x800) r2 = geteuid() mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000240)={'trans=unix,', {[{@dfltuid={'dfltuid', 0x3d, r0}}], [{@dont_measure}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@hash}, {@euid_gt={'euid>', r2}}]}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r4 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r5, r4, 0x0) openat(r5, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) openat(r5, &(0x7f00000002c0)='./file0/file0\x00', 0x90800, 0x48) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 15) 10:20:15 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xde84b26d35683ba1, 0x11, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x6, 0x0, @fd=r0, 0x4, 0x0, 0x3, 0x3, 0x1}, 0x2d8) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x40110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = dup(r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000001900000008000300", @ANYRES32=r5], 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r2, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xf8, r4, 0x10, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_QOS_MAP={0x10, 0xc7, {[{0x1, 0x3}, {0x1}], "5669293a4fa0b6e8"}}, @NL80211_ATTR_QOS_MAP={0x1c, 0xc7, {[{0x8b, 0x3}, {0x8, 0x1}, {0x1f, 0x7}, {0x7f, 0x7}, {0x0, 0x3}, {0x1f, 0x7}, {0x1, 0x6}, {0x81, 0x1}], "8f8122a1849705a1"}}, @NL80211_ATTR_QOS_MAP={0x1e, 0xc7, {[{0x5, 0x7}, {0x80, 0x6}, {0x5, 0x6}, {0x4, 0x1}, {0x6, 0x3}, {0xfa, 0x1}, {0x5, 0x7}, {0x6, 0x6}, {0xf0, 0x4}], "7879f1caea3f0ca3"}}, @NL80211_ATTR_QOS_MAP={0x2c, 0xc7, {[{0x33, 0x1}, {0x4}, {0x3, 0x6}, {0x9, 0x3}, {0x5, 0x6}, {0x7, 0x4}, {0x0, 0x1}, {0x0, 0x3}, {0xfa, 0x3}, {0x6, 0x3}, {0x40, 0x7}, {0x33, 0x1}, {0xd8, 0x1}, {0xa2, 0x2}, {0x5}, {0x0, 0x6}], "5b03b9da6b6304ea"}}, @NL80211_ATTR_QOS_MAP={0x2e, 0xc7, {[{0xe0, 0x3}, {0x2, 0x4}, {0xaa, 0x2}, {0x0, 0x2}, {0x4, 0x3}, {0x7f, 0x5}, {0x7, 0x4}, {0x7, 0x2}, {0x81, 0x5}, {0x6, 0x1}, {0x1, 0x2}, {0x5, 0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x80, 0x6}, {0x3, 0x6}, {0x9, 0x2}], "a0ae88eabd5919f6"}}, @NL80211_ATTR_QOS_MAP={0x1a, 0xc7, {[{0x7e, 0x3}, {0x6, 0x3}, {0x0, 0x2}, {0x0, 0x4}, {0xab, 0x7}, {0x5, 0x6}, {0x3, 0x3}], "626f980f2b8d2427"}}, @NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{0xde, 0x4}, {0x7, 0x6}, {0x7}, {0x20, 0x1}, {0x1}, {0x1, 0x5}], "7e3cba5b244b0fc9"}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0x408c1) [ 1588.348115] FAULT_INJECTION: forcing a failure. [ 1588.348115] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.353822] CPU: 1 PID: 8440 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1588.354696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1588.355766] Call Trace: [ 1588.356112] dump_stack+0x107/0x167 [ 1588.356583] should_fail.cold+0x5/0xa [ 1588.357093] ? proc_alloc_inode+0x18/0x200 [ 1588.357644] should_failslab+0x5/0x20 [ 1588.358139] kmem_cache_alloc+0x5b/0x310 [ 1588.358668] ? proc_free_inode+0x20/0x20 [ 1588.359210] proc_alloc_inode+0x18/0x200 [ 1588.359733] ? proc_free_inode+0x20/0x20 [ 1588.360255] alloc_inode+0x63/0x240 [ 1588.360723] new_inode+0x23/0x250 [ 1588.361191] proc_pid_make_inode+0x22/0x220 [ 1588.361791] loop3: detected capacity change from 0 to 135266304 [ 1588.369117] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1588.369133] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1588.369147] proc_pid_instantiate+0x50/0x1e0 [ 1588.369165] proc_fill_cache+0x373/0x4a0 [ 1588.381204] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1588.381980] ? pid_update_inode+0xa0/0xa0 [ 1588.382533] ? pointer+0xa80/0xa80 [ 1588.383001] ? snprintf+0xbb/0x100 [ 1588.383488] proc_pid_readdir+0x3d3/0x830 [ 1588.384054] ? proc_pid_lookup+0x460/0x460 [ 1588.384629] ? inode_security+0x107/0x140 [ 1588.385209] proc_root_readdir+0xa0/0xd0 [ 1588.385740] iterate_dir+0x584/0x710 [ 1588.386232] __x64_sys_getdents64+0x13a/0x2c0 [ 1588.386814] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1588.387402] ? fput_many+0x2f/0x1a0 [ 1588.387903] ? fillonedir+0x4b0/0x4b0 [ 1588.388398] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1588.389103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1588.389772] do_syscall_64+0x33/0x40 [ 1588.390253] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1588.390914] RIP: 0033:0x7faf66c84b19 [ 1588.391395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1588.397780] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1588.398771] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1588.399693] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1588.400610] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1588.405537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:20:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x18) [ 1588.406463] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1588.460298] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1588.522236] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. 10:20:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x200100, 0x40) openat(r1, &(0x7f0000000000)='./file0\x00', 0xc0400, 0x80) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x34) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180), r0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400090}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0x20, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4040085}, 0x0) 10:20:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000004580)='cgroup.events\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x1, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="1deaeefe3d84776d58c4252672c2cc6a6a47478f66a3f8c4058057c82bc241548b8c1cd4d4501fbce8d6b62b0876c5b691f05efeeb6786f1418ce309bc6ba65a29044b2d15ba4679f22e7a15821dce2c24f7b3550ade7efb0a0de83c4db0e3f1851e9dc3571400d0661fabe15a9a9e54f0e8", 0x72, 0x8}], 0x800000, &(0x7f0000000240)={[{@uni_xlateno}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'cgroup.events\x00'}}, {@obj_user={'obj_user', 0x3d, 'cgroup.events\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@subj_role={'subj_role', 0x3d, 'f@\xd3)'}}]}) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1002) 10:20:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000200)=""/163, 0xa3) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:20:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 16) [ 1588.612532] loop3: detected capacity change from 0 to 135266304 [ 1588.615595] FAT-fs (loop4): Unrecognized mount option "smackfsfloor=cgroup.events" or missing value [ 1588.646024] FAT-fs (loop4): Unrecognized mount option "smackfsfloor=cgroup.events" or missing value [ 1588.694039] FAULT_INJECTION: forcing a failure. [ 1588.694039] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.695826] CPU: 1 PID: 8484 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1588.696745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1588.697848] Call Trace: [ 1588.698204] dump_stack+0x107/0x167 [ 1588.698707] should_fail.cold+0x5/0xa [ 1588.699220] ? create_object.isra.0+0x3a/0xa20 [ 1588.699814] should_failslab+0x5/0x20 [ 1588.700307] kmem_cache_alloc+0x5b/0x310 [ 1588.700857] create_object.isra.0+0x3a/0xa20 [ 1588.701423] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1588.702083] kmem_cache_alloc+0x159/0x310 [ 1588.702664] ? proc_free_inode+0x20/0x20 [ 1588.703193] proc_alloc_inode+0x18/0x200 [ 1588.703769] ? proc_free_inode+0x20/0x20 [ 1588.704300] alloc_inode+0x63/0x240 [ 1588.712765] new_inode+0x23/0x250 [ 1588.713224] proc_pid_make_inode+0x22/0x220 [ 1588.713785] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1588.714526] proc_pid_instantiate+0x50/0x1e0 [ 1588.715093] proc_fill_cache+0x373/0x4a0 [ 1588.715617] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1588.716384] ? pid_update_inode+0xa0/0xa0 [ 1588.716940] ? pointer+0xa80/0xa80 [ 1588.717407] ? snprintf+0xbb/0x100 [ 1588.717884] proc_pid_readdir+0x3d3/0x830 [ 1588.718425] ? proc_pid_lookup+0x460/0x460 [ 1588.718970] ? inode_security+0x107/0x140 [ 1588.719511] proc_root_readdir+0xa0/0xd0 [ 1588.720036] iterate_dir+0x584/0x710 [ 1588.720523] __x64_sys_getdents64+0x13a/0x2c0 [ 1588.721116] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1588.721707] ? fput_many+0x2f/0x1a0 [ 1588.722178] ? fillonedir+0x4b0/0x4b0 [ 1588.722676] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1588.723355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1588.724021] do_syscall_64+0x33/0x40 [ 1588.724506] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1588.729179] RIP: 0033:0x7faf66c84b19 [ 1588.729663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1588.732024] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1588.733020] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1588.733941] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1588.734858] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1588.735777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1588.736691] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1592.484971] hpet: Lost 1 RTC interrupts [ 1592.689011] hpet: Lost 3 RTC interrupts [ 1602.609056] hpet: Lost 1 RTC interrupts 10:20:29 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = openat$incfs(r0, &(0x7f0000000140)='.pending_reads\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x5, 0x9, 0xd4, 0x0, 0x0, 0x100000001, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffff800, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x4000, 0x5, 0x9, 0x8700b0cdbf5df955, 0x5, 0x7fff, 0x101, 0x0, 0x9, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r2, 0x4) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:29 executing program 6: timer_create(0x1, &(0x7f00000002c0)={0x0, 0x21, 0x0, @thr={&(0x7f0000000140)="e2e580fcf72906fd783bc4a4e36e3730dcd17f11267b0ce22d05dd184628d8960a4e5e8f976c842fe5a8a705446e15df87796972e6ee45678e363aa6e4408baaa94cf933f3eb60aef91d1c27d0c549adfc2bba480f1bcf845e3f66fbeb4dc3bf9ccc06c7b7f42de0190568c18f3830828a22806c7fea09a4f6b819562427716f40554054db381d19c1edf6c633ba47ae1529c5510a2a611009014f46e5169afe2562f7d12521b5b0c8f7f7a008e546a85affc5a245e808ed9b284fe61ce6c76490c2bf7873a4571b161655c01d183d32ef1482b03565878c13f1268ad3", &(0x7f0000000240)="8f98f226945e443d8be698681c0dc07094469633a47d0c26dcf68ce2dd40f301a551ffd2c98c2d144c0fc2c50940218dd0c44bba8da48b2b30b4a8f61672894bcc69"}}, &(0x7f0000000300)=0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @private=0xa010101}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) timer_delete(r0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:20:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 17) 10:20:29 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x82800, 0xc7) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1003) 10:20:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x161000, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40818}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f0000000640)={{r0}, "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"}) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000001480)={@broadcast, @dev={0xac, 0x14, 0x14, 0x20}, @empty}, 0xc) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000240)={0x3, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e20, @loopback}}}, 0x108) sendmsg$inet(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000180)="6604e527423629189cbdb34da2022409e97717ec465e114e6b03a6e84bb7f50b298d9120b0639d0977dacd38a9119a426a04c4807cae20b0099187288579aa1a3e99f20dac6a78c7fadfa6384e92e64ed8fa513865d7f2af9dd7cc5f14829e8ae1e502a6c153367514f5e4549922fa0644096ee1d21cacc6ec9df066dd0903ae482a52e97fade62e5884b87bffbc9d9459b9d9cb07e1", 0x96}, {&(0x7f0000001e00)="0d2db39cf0ea9e234d8409920c445752ed6394e139bb3516ece657f37c687bd9c316622aaafee63714a922bde752a7f12747bd109da244a7e40f73b638f284deac424d4ff468ae96d8941c26a294354606a45d4373b74a9e58e5dd2faa871fa7f0cbbae3fc999ece44481674923e5720413edd0eeef557a704572d1d51309775cbb53c057e584c27f914713e37a93c851582cbc9de9acd03ed93087184bd3b8e91c918951c8cf43aefd89fae8cb94ae4957ccc676534a3c7b4006117fa9304f670699c8645021c59c6c318bb337a3608e02ad4839aa0f3a7fc6f5a7864c9125ae7dc73d33e63c5efe38882a03198b26f2e3aab5f8f065b10e58dca9c376e064c0f96b9636c1f6dce0ea6ee41cabeace0d00df5865f90048a13f78e762444b826b4bc63cead4efd5c603081968297e140566f00b2b059efa617d681a1b3806e93b8f0530219b322db636aa974bcfc8742b77e7d16fae3e40bc2de5ebeec6552cfb46baad96176fdd5816934161e1837ea604281b92c34e1a43a5d6bfc2c1ce4838a161fd552db39e0e0e4ad0ac6c5b1ff6a57c84ee910da7b54e718830f6dbb620b19f78a4f37edcbc6168326bacaf824f3046f83a2d90e2c2ffb07cfb717d0f155d4ca7828fc9aa8addb4397411330c1aabd0b9eaa4fec9371b20976cc82e539aec8768b78a6ca81381c1fbd156d40ec271f86846d80cdcab4640531c0e1a243f756c02509aa45f402f2393515ff69e6f348e54c4abbf7671f460bc534795c84ad2f217725e971ea8cb9b9e2ac9959ad0a095585c8b39206ca42039e4349847f31bc4c0ab55fa21af900562f87e2d8f34b33f010a0ae0ddcb52e718a2e7cd595706b1a6e009907318fcc716b0344b83f33494ce495978deabbd85db07e9af1fb01c36d2bb7136bf64d5d1a524ed40d0ccb4826bc7896821def539be5fc4aa45e42b7a6bdb698a6b30f700dba1744b3c107695d6b429ad546b1a3462daeda72e9efade76b1d41a75275466f990e0e37122f32e3b96d7fa39e00dbf994c8d888fc77e6c28af6f777e6a8e2f141200908fbbc7992542645a9b814418ea47b51fbd2b640b4a31061bbbda3531291ea0bc637c0c3bd265aad72f9f5640a34c819f6d9508fcf2a4e6714be2a38023f3f6a813caf81b3bc1819906e5ae6311dabbef3408a7edc94e88ea3758f4de33436f5b8b2badd1cdc10106f87a7c39d8e9d8e2ee88a05975c2f0d7c1b83a3703b49db5da6a365f17afe05231a281e4295b0bc6a6cfb9617f93292f4ee1a3d6fe04760db486a01751d85a7ba82cdcfffced2bc67c6fc1e4a406f9b71e58898c857e2848d5bddc0cea1a09aa369926e2ffa1f6913682cb242bfe13f6f56b0e5ba6546e6c5d32b706614a0fee5e2b0e0429bb5f292c2284e083594a75f8383aee5bf597ad8f2533f35ac9ad173cbcdc16500aedc6c1315b403e28b131170cf9768486f7375eed625c4577c1f8eebb8aa22c9a9bbfc1b0c8b3be523f45620d538fc4c47f8dba0965b2e797a3afa857134aecfc125a43005250d2b62e29ac98b7aa4478aebab1a6010034914b65958da947ea316d839af097b02268656057179e1f8b28e077422316f51e11827759c628f69a4b5a55f0ad6c5dd166470f0b0d3e200ee2e096a7475511be0adc499be311edbb229cce00c04b70b2b7c27c1b38324fe87b0abb0b3f9ed2eeaef7d772713fa22f7d4b719fec6f72ecf3aa8cc323603d9323ed7a947b17996d7576e292b2f0d9639ff37e1c696999c1d270bf53340ca339070c3ff5d0a4f0a80cc16c44fd71f93e20afdd81aaafafceb444184823cda7c7d45619d737c721f467d615ac31415c51623e15c649cbe91e19824710331274331d8e0cd2c4eef44a965c79356fbcecdc424cff5528759e62571f220a3676275cfd8c92061aa977a33710c9bae0a191e1f9886bd625b15b314abcf74fcacec2669aedd10fa72c7a15cd4f850fad68415c0cc84e0c4b2009a9f492ce5a0d465cea80f37e20e8b8981f52ff5de4a9604ffabad214af4f251e5046f513a290c145312a7e27e9be921931c3cecaf687720b29c15df943ab8914a5ef86c98faca83366cd2315ebd63b7722cd45ec2f550789889efa844a5ddc973c96a4b5d44699eeedd9ada7f4bc70cb622c4e28ec2033f99064dd789fc7c55907a1b3efc4de79f7676669759b5db789b9d86e8aa16f16cd59be759c9ca25bf310185edb80aa9ce7a0bfce8b488d502d231e07e0621e474c3f9246aa3f67a5725d850c54b1704e08e263efdc24892bc0680f7e4bdee65cd6324ab44dd3515ad790547837c6a4672628d930d7594871f6c303339bb2ca6cfb6d024abf91c85aeacc5512a192532d2d05db9a8257720e07a14da43b256d4833490ceb367e73498b5e4d8c9be69c43b4c8a96593caa05f59bfabbc8a914bd8ab76aebe0928816eb471a72415e29496fd341a38a01c5aa097362866d08fb8a3328eb11323b348240ced69dc50e96d75067c693591db9f6f9aa218e030a8e62455018aa7ae68402d337334a869512e701c749b2fd8a83e9aa3f7ff7936510470a974b2d80951fad0947d646531ae01acb9f137390a07b43bc978870ae19e8183f077a43ddae4b217220fa3dd5b247ec180434bd23c8ae4585d8f1ef1515223698c2982416186c438fa84bc27c67fac9e14aa88549b85aa835f4f767a146907f0b89856ff072115319000554a43dec54ea008fb0f2d7480cca57128ce48014f4ff96f52caffaacd00706eb06fbe719b94a530c5aef15117eaecc26f07378c983e35ae41154bb97bfb90946ca2fc55601e4f36647fbda044fb8481b13c33b34ad5f30a0c5844fb4c544a9bc8e6b0ddd6058dc3723f440c7be0436fecc7b0fa59bd7fc15e8dd4d100adcfe1972c92c16a2b658f8fa2815d0a696f0731ff9ee0c33999edd2946384315330938eb908e2f947d76697c8b3df9d720351c3408486b59b2558ebcb7367e44b78601d4cdf38286061da254c2297657d894e5ddcc98b686851e520c471f4403d600f430ec62fcc2ad0e29307dccf3e4de2d2f336c9358669e7d31024f13de1ada3779e41fabef5ffa16856d24784813264be0845bc6216018e424f954e8529f31a3a7d8d7fc85f58226d4f2eef88d69d788fdcfc4e94de61d6efe5137252abff8b413a96cddbf3ce570eef286e943b62ce93c80855c6b25b8b41811401760b2fc7d99462ce86e067dbcea48eafb70953f59830040c2e26194e9aaeb8bdb746073e80ec88be5d3e0e762936e24885305a5d6bae21cddeaa1592043d88cb02cbceeb062b47e22387c06db41682a0be24d88958fa5f48b1862bc69889bb8c0c03aa5f6d2e1439e20bcc178e9e7da712d77eed81405de5b56c8d71ec71c3b472c4a8e0cde6b72de7fb74ecfd04f96ca08ef4355f88795fca90759f83caac69c7afc2bb573824e4dad2405b2f1c2a2ca579ab163a728fd07c32f677459631c6f9aba342089b636a2b339654ca147c1022ed7772393bcedfa321eb81b4aeb0b5a3b1d12224a7936beb22e31c6f3480a92cd60b4ef1bb4f0fd5ccac56be0de65973c5cb7313de1bd72b0562547650ae889242a0a0e0a7ec740dd6d9d72e8994397cc789b2a607fe85a7c2cb4a14399009d5a222c9ad881415468b63bcc73e829bc480c0feca1e9a772dfce95c0673fb39100e5040ac326f0b2d097aca6a0c6b7dfd127f64424fbb3d1ec713ff48d7cdc807ec470a4c34ef0e839f7b8d661c735ea7b0976084bdd31f5fd0c20cf19f0320ceec33a022cd85a7f1119562bf81788dae03bf87b408816c491277ec375c8e7bf749a3248ea7ccbbaa65f7a936fa8f8200e0e20b337741c7f8ec94c09c81c8d93c6734f19fe554eec293858b758e866060604d86c537f1eeabcdf2de14bc8b7fe3f1a4a4156b60c8f2550ab62c8425be8aca7972dd33a5fe05d57e14bd90457adab62a797b598a8dfd3c83a4a41b9f33a2855cdb1e7e17a4c3660947164d791d000a30099f925683541999bb3f37abe2b5d53d63f44455e00914e272abef9d16c7374f54c6d264513989783add1a8571344fc629e50ef0e5eb94d5397ef8bc1287410807a4565be9632815ae9df185851e0f2ac7e6c4e34c4c9215a4b44854f88f021e030ea67bb1b96572c63a8a5a15fc8dc739db7aafb92fc18f4989323236b2768d0882134142e274d91065f2d88a8f9199105292d1aeb7668d8637b49192598fde735b816d0724765e813260464badd55802d857134cea477082907efb36ff5495ad0f3e97cc8f216d8698b116532fb6bcfbec4a404bab32a039c256b0cb3825e0a3f56d142220fc4cb3aaef673f268df83314eec3b5b193815dc9103bc2212a079606dd4dbad6bee7bde5d7032cced13c64a1230e31a63725f8efbfd0c8c8b1142f2f43443bbca56b9070823910ec92aa6332e2a98f669bddee8b8ba317b3e4e0b6d1d1730eccc56c03c3032228da10f3be1f92dbf3ac3e7229d83dfb5b2740d8c85ffada29d7b04edcd346e429894000e811a92da9aea2b1794a25c37a144cde636c3a75dcb29a8bf955e4b02f4921eadf583d40600a066411e833bae076c6abe54541a1654e32f3e392ab034952f0e053212e90bce7f673501045910527d1758ac05dff046e8fba200408fc993aaeec49a580aad0df070d94d3273d1d9cc2db3b93a8f5fab192dbd72451d8b1bc2a31142b47250d0ec5bce94573c893a65b7f981869cd9649471f06dc5f809c226eb0ccddf8cbf988d98d0c6a7156e71e638541d011fbf086b0fd528d157e6b933233f162d5314a012aca1930c60d13c7071c25cccd6096bbfa4071fa2acf55ad10b00f24e9864664c60c82514c2022331a1a83506626201d45e9a1618420b13054a4dd0ca5eae33eba22eacc705dbb50c8a4d7ba85fa573326dd9e93df9707b9da76c3726d20616197d3fae201f7476051398f35a426b3882fa502136dc8c8ef919e82aa288dedf763d7b83be7a3925b7103fef9ace05a125accbdea7a5b8d92ff0b50f570172ec5edc93352364faf1fc7b77e5cf6d38d55a8177397bba1bcaf35d33dce7557ad513f19138bc5f432418a9d8c95884e49836d46ff498bbf66690e6e47ff2bb6b7edc9c9bf75d7967ff0b81bb00b65b55b1ae65025bd70c4769ddb6f618c205d972336eacfa93de0a68173e6295e76f762364dee650898052391bf4a21049073223a4d48099225fce07fa4a6b6dc72a46cf55c73f2595468ff037f8ecbb65ea7cc67333ed951325ce9724483d41050d1a798aa5aa37d05813a4dfb2bd7ba641560f30115691a36f74aecaa914894e57bed26dd9ba70e043ad158640f492201a7c2e1fa597d301ec8e009c859ee8d8452559e4630baff10112cd25c59159827569f0cc3d406e3bdf46fca6162778b7b5cc9c951d72f18126588d0faa71fabad66ed83c9c9ffb7429c28834b1b187f6fdaa5e05512bbce9f0f573331ddcebb3635264006cd6734da90e737ee893ea5fe30153797f9ddc87260d12edd01c140a6469452188b234cfa8e51397907030a721b0f3a0f1e0f2181efacc0c288116083840627f33723e8c12bab8f0157529ad226cc694944246922c21f5f307174bfa86c2d368258de63a03b876288b15eddb24f3e7d5495bbeedf9de02ba645f6a9419ae2d252c38b697a1948415a10e8952b0ac15b43831f83d98c945baca9b6322b2bd0a3335fece32e367dfb62f75fbf4831b508cbabbb0150cff944be9566946877911fc130fd2b5ccb61f5872413ab827e89c5da6267e67ac5be4a3", 0x1000}], 0x2, &(0x7f0000001880)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac141430ffffffff0000000014000000b134e2900000000002004000ffffffff00f10000140000000032000300"/60], 0x190}, 0x10000000) close(r2) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:20:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) socket$inet_icmp(0x2, 0x2, 0x1) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000040)={0x0, 'netpci0\x00', {0x1}, 0x8}) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1602.912974] FAULT_INJECTION: forcing a failure. [ 1602.912974] name failslab, interval 1, probability 0, space 0, times 0 [ 1602.914498] CPU: 0 PID: 8517 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1602.915372] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1602.916429] Call Trace: [ 1602.916774] dump_stack+0x107/0x167 [ 1602.917266] should_fail.cold+0x5/0xa [ 1602.917757] ? security_inode_alloc+0x34/0x160 [ 1602.918349] should_failslab+0x5/0x20 [ 1602.918836] kmem_cache_alloc+0x5b/0x310 [ 1602.919365] security_inode_alloc+0x34/0x160 [ 1602.919932] inode_init_always+0xa4e/0xd10 10:20:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1004) [ 1602.920475] ? proc_free_inode+0x20/0x20 [ 1602.921016] alloc_inode+0x84/0x240 [ 1602.921483] new_inode+0x23/0x250 [ 1602.921934] proc_pid_make_inode+0x22/0x220 [ 1602.933269] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1602.933942] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1602.934678] proc_pid_instantiate+0x50/0x1e0 [ 1602.935246] proc_fill_cache+0x373/0x4a0 [ 1602.935763] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1602.936536] ? pid_update_inode+0xa0/0xa0 [ 1602.937082] ? pointer+0xa80/0xa80 [ 1602.937547] ? snprintf+0xbb/0x100 [ 1602.938020] proc_pid_readdir+0x3d3/0x830 [ 1602.938558] ? proc_pid_lookup+0x460/0x460 [ 1602.939102] ? inode_security+0x107/0x140 [ 1602.939641] proc_root_readdir+0xa0/0xd0 [ 1602.940161] iterate_dir+0x584/0x710 [ 1602.945068] __x64_sys_getdents64+0x13a/0x2c0 [ 1602.945645] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1602.946229] ? fput_many+0x2f/0x1a0 [ 1602.946695] ? fillonedir+0x4b0/0x4b0 [ 1602.947191] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1602.947863] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1602.948531] do_syscall_64+0x33/0x40 [ 1602.949026] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1602.949682] RIP: 0033:0x7faf66c84b19 [ 1602.950161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1602.952511] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1602.953506] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1602.954419] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1602.955331] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1602.956245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1602.957166] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1602.968922] hpet: Lost 2 RTC interrupts 10:20:29 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8408, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r4, &(0x7f0000000100)=0xfffffffffffff674, r5, 0x0, 0x0, 0x0) fcntl$dupfd(r3, 0x0, r5) setsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f00000003c0)={@multicast2, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r6, 0x5, &(0x7f0000000840)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x8, 0xffffffffffffffff, &(0x7f00000004c0)="8eda496bac7829a5a06e60b209492d91e99ffb656fee7938f385826970582a55b86af65b27b9beeef4b849fa5546ecd0492b21e4a14ad9591377707275cf7d0892e760be34b5b5b17ea42f4da6a3285b10a1673d49bbf47bace904369bd4c2de4154d17e8741824799c911944083f14c50ae1d322ea6e855e1857b83e92d1b7293e4d4045fb25adf55c7c0974f2fc55e4c7226333a0f9da063", 0x99, 0xffffffffffffffff, 0x0, 0x1, r2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x2, 0x3, 0xffffffffffffffff, &(0x7f00000005c0)="c6d510582e3c13d1e5c47a47d0d734309b54d5720539f49504df6b1b3915dcee82be92d19a4ea4811ac8b891d37968af6214f7e88090f1f9cdf8c3972c69e6fa06c6777b515a08814b569f8bdcc58606573d444e8ada5d54e42489ea7de5c66745ad8f16bfcb5071dc26", 0x6a, 0x0, 0x0, 0x1}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f0000000700)="5e8e82b3855b9d148ff0dede6437ad754d1ddf2c33f8dfa2d66d375bf9b0a105d70dbd3604845e9e7b34a991a602278d67fecd8807eb5745b1a945bcad7f6adc327d75902ccf00b5ea02ad61e6e5aaef1cb7ee64e97ed2f417e004cbca6a1b9edff91b717caed6207d0467ae091176c1018b0527356dd0a0bf79b6d43a962bfac3f6bf15412bd655cce819d0333f5ebb8e778358875a5c7ba9d18ae8ba82eea44b1befa1a10e", 0xa6, 0x4, 0x0, 0x2}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x7, 0x9, 0xffffffffffffffff, &(0x7f0000001880)="3106b3ea678e0916efb17a3b81ace3d432dc08f1290653f9b6bfd5b5dfd7312e503b4b6889889201ad4bf3ba50abb4b03d7029ad0e98a52a7cf30dae5b7c2afca283f9f3688026f781700de4c8280c565ccbbf2196163447e97f5b8d5931e15a40e2c4bab01351a198df439a547f5f3f16bff50234bee6b68fd70f8866a6d4d224fcb95e34ae38a7cdd48cd78c01f632ff65fd7f8eb2d2472428bb7c6ac3165d59715af134f514fb8d6e43487d28b458626cb752ed422cc1bed758eda1a8d5c45d29620f8005bc4822eb6c1b43414c09e5a6", 0xd2, 0x401, 0x0, 0x1}]) recvmmsg$unix(r2, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) faccessat(r2, &(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000180)="5db4cf9a892eff5d4d1a1a", 0xb, 0x4}, {&(0x7f0000001e00)="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", 0x1000, 0x1000}, {&(0x7f00000001c0)="c590f4d91bf32cd6f792209f37a02dd5eb9ad0886cdd71d0d8843c3897acdf8cabc5350d87008dd7960fb477617910140930042092f2bdd6e82d6f9244bb435c", 0x40, 0x200}, {&(0x7f0000000200)="d22e92d455f80c75eeed2222a97e3d9f907484546b27a84b029de4708b7859ec342f63030fd971a4c23acf4fe6f1cff6c5eaba5a09d40007f27d0847afab46fe234cb515d810d3830b37968db77f2d8a638a53766fdeca0624acc91610f54438d8928f143195abf1bb31f30f", 0x6c, 0x3}], 0xf, &(0x7f0000001980)=ANY=[@ANYBLOB="6e6f62682c7375626a5f726f6e653d2d2c6f626a5f726f6c653d06b7d7e24374b4f8643c", @ANYRESDEC=r8, @ANYBLOB="2c06f0a34abfd2f8c63e0086dfa5"]) 10:20:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x8, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee01}}, {@version_L}, {@msize={'msize', 0x3d, 0x6}}, {@posixacl}, {@loose}, {@fscache}, {@version_u}], [{@obj_role={'obj_role', 0x3d, '(-%\xa2'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@seclabel}, {@appraise_type}]}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x84, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) [ 1603.010294] loop3: detected capacity change from 0 to 135266304 10:20:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/79, 0x4f}, {&(0x7f00000001c0)=""/120, 0x78}, {&(0x7f0000000240)=""/94, 0x5e}, {&(0x7f00000002c0)=""/98, 0x62}], 0x4, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}, 0x100) close(r0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x4, 0x3, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x1}, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1603.075793] loop4: detected capacity change from 0 to 8192 10:20:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 18) [ 1603.124154] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:20:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, r1, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) setsockopt$inet_group_source_req(r2, 0x0, 0x2c, &(0x7f0000000440)={0x1ff, {{0x2, 0x4e21, @rand_addr=0x64010100}}, {{0x2, 0x4e21, @loopback}}}, 0x108) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) fcntl$setstatus(r3, 0x4, 0x40000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r4 = fsmount(0xffffffffffffffff, 0x0, 0x6) clone3(&(0x7f0000000380)={0x208820100, &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)=0x0, {0x28}, &(0x7f00000001c0)=""/161, 0xa1, &(0x7f0000001e00)=""/4096, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0], 0x6, {r4}}, 0x58) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x4, 0x0, 0x0, 0x0, 0x62, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x2bae}, r5, 0xffffffffffffffff, r4, 0x3) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r6, &(0x7f0000000880)=""/4096, 0x1000) 10:20:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1007) 10:20:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e23, @private=0xa010100}}}, 0x108) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f2a0000000004010000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='squashfs\x00', 0x1050880, &(0x7f00000001c0)='[{}\x00') r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80, 0x100}, 0x0, 0x1f, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = accept$inet(r0, &(0x7f0000000280)={0x2, 0x0, @empty}, &(0x7f00000002c0)=0x10) r3 = eventfd(0x2d) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000300)={0x0, {{0x2, 0x4e24, @private=0xa010102}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) 10:20:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x73) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, 0xffffffffffffffff, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) openat(r2, &(0x7f0000000140)='./file0\x00', 0x2000, 0x1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x2) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:30 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1048) [ 1603.288140] FAULT_INJECTION: forcing a failure. [ 1603.288140] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.289934] CPU: 0 PID: 8551 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1603.290811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1603.291868] Call Trace: [ 1603.292221] dump_stack+0x107/0x167 [ 1603.292692] should_fail.cold+0x5/0xa [ 1603.293205] ? create_object.isra.0+0x3a/0xa20 [ 1603.293796] should_failslab+0x5/0x20 [ 1603.294288] kmem_cache_alloc+0x5b/0x310 [ 1603.294816] create_object.isra.0+0x3a/0xa20 [ 1603.295379] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1603.296040] kmem_cache_alloc+0x159/0x310 [ 1603.296580] security_inode_alloc+0x34/0x160 [ 1603.297172] inode_init_always+0xa4e/0xd10 [ 1603.301173] ? proc_free_inode+0x20/0x20 [ 1603.301698] alloc_inode+0x84/0x240 [ 1603.302166] new_inode+0x23/0x250 [ 1603.302617] proc_pid_make_inode+0x22/0x220 [ 1603.303173] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1603.303916] proc_pid_instantiate+0x50/0x1e0 [ 1603.304478] proc_fill_cache+0x373/0x4a0 [ 1603.305027] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1603.305796] ? pid_update_inode+0xa0/0xa0 [ 1603.306326] ? pointer+0xa80/0xa80 [ 1603.306791] ? snprintf+0xbb/0x100 [ 1603.307265] proc_pid_readdir+0x3d3/0x830 [ 1603.307803] ? proc_pid_lookup+0x460/0x460 [ 1603.308346] ? inode_security+0x107/0x140 [ 1603.308881] proc_root_readdir+0xa0/0xd0 [ 1603.309450] iterate_dir+0x584/0x710 [ 1603.309934] __x64_sys_getdents64+0x13a/0x2c0 [ 1603.310510] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1603.311094] ? fput_many+0x2f/0x1a0 [ 1603.311562] ? fillonedir+0x4b0/0x4b0 [ 1603.312061] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1603.312731] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1603.313422] do_syscall_64+0x33/0x40 [ 1603.313900] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1603.314558] RIP: 0033:0x7faf66c84b19 [ 1603.315036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1603.317416] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1603.318392] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1603.319305] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1603.320217] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1603.322108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1603.323028] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1603.324095] hpet: Lost 1 RTC interrupts [ 1603.342640] loop3: detected capacity change from 0 to 135266304 10:20:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:44 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x401, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 19) 10:20:44 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = signalfd4(r0, &(0x7f0000000040)={[0x2]}, 0x8, 0x800) setsockopt$inet_group_source_req(r2, 0x0, 0x2c, &(0x7f0000000140)={0x5, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e20, @local}}}, 0x108) 10:20:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x2a800, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='ext4\x00', 0x800004, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x6) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x5453, 0x0) ioctl$FIONCLEX(r2, 0x5450) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000200)={0x45, 0xfffffff9, 0x7, 0x9, 0x6}) getdents64(r1, &(0x7f0000000880)=""/4082, 0xff2) r3 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f00000001c0)={0x0, 0x9, 0x5}) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000140)) 10:20:44 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x104c) 10:20:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x200000, &(0x7f00000001c0)={'trans=unix,', {[{@access_any}, {@aname}, {@access_uid={'access', 0x3d, 0xee01}}], [{@smackfshat={'smackfshat', 0x3d, 'proc\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1617.302130] 9pnet: p9_fd_create_unix (8581): problem connecting socket: ./file0: -111 [ 1617.329460] loop3: detected capacity change from 0 to 135266304 [ 1617.335956] 9pnet: p9_fd_create_unix (8588): problem connecting socket: ./file0: -111 [ 1617.336302] FAULT_INJECTION: forcing a failure. [ 1617.336302] name failslab, interval 1, probability 0, space 0, times 0 [ 1617.338691] CPU: 0 PID: 8583 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1617.339574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1617.340634] Call Trace: [ 1617.340978] dump_stack+0x107/0x167 [ 1617.341466] should_fail.cold+0x5/0xa [ 1617.341958] ? __d_alloc+0x2a/0x990 [ 1617.342431] should_failslab+0x5/0x20 [ 1617.342933] kmem_cache_alloc+0x5b/0x310 [ 1617.343460] ? mark_lock+0xf5/0x2df0 [ 1617.343942] __d_alloc+0x2a/0x990 [ 1617.344388] ? lock_acquire+0x197/0x470 [ 1617.344900] d_alloc_parallel+0x111/0x1bc0 [ 1617.349460] ? lock_downgrade+0x6d0/0x6d0 [ 1617.349991] ? find_held_lock+0x2c/0x110 [ 1617.350521] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1617.351066] ? __d_lookup+0x3bf/0x760 [ 1617.351565] ? lockdep_init_map_type+0x2c7/0x780 [ 1617.352173] ? lockdep_init_map_type+0x2c7/0x780 [ 1617.352788] proc_fill_cache+0x2f6/0x4a0 [ 1617.353322] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1617.354089] ? pid_update_inode+0xa0/0xa0 [ 1617.354621] ? pointer+0xa80/0xa80 [ 1617.355081] ? snprintf+0xbb/0x100 [ 1617.355558] proc_pid_readdir+0x3d3/0x830 [ 1617.356094] ? proc_pid_lookup+0x460/0x460 [ 1617.356635] ? inode_security+0x107/0x140 [ 1617.357192] proc_root_readdir+0xa0/0xd0 [ 1617.357714] iterate_dir+0x584/0x710 [ 1617.358191] __x64_sys_getdents64+0x13a/0x2c0 [ 1617.358812] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1617.359401] ? fput_many+0x2f/0x1a0 [ 1617.359871] ? fillonedir+0x4b0/0x4b0 [ 1617.360366] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1617.361037] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1617.361738] do_syscall_64+0x33/0x40 [ 1617.362212] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1617.362913] RIP: 0033:0x7faf66c84b19 [ 1617.363391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1617.365787] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1617.366851] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1617.367878] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1617.368908] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1617.369975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1617.371013] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1617.372263] hpet: Lost 1 RTC interrupts 10:20:44 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x20) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r0, r1, 0x800) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0xc0a, 0x4, &(0x7f0000000380)=[{&(0x7f0000000180)="000adfe8501b75cbc3fa4e3d98a94c3c12472ad49379e593a16948aeb44f84b7d5bf0678dccfa233b844a63ba1d9f66c6b9e883b4935102b84f6b0cf51ca9c94d0", 0x41, 0x40}, {&(0x7f0000000200)="15c56677613931501d7deafa2635a3f453e83eca8a5f4266619d2f8b7b7b37465a2b2b1cacc41c459c287dc14c95ded59b7eb37e44566cd55bf2bc198e3c82b105d092f4d66fef688d6941d3c7b951aa3b54119ccdef5191a5ac6d89448c4d3c40a15a56c5771c46af9772cb3a", 0x6d, 0x1f}, {&(0x7f0000000280)="22c27456bac54c150463651ccec3847c9600aea21dcfd5352baa277a8285cdcab2389a31acb194cc5c70c53ee83830c66b790d2125320582027bb33a288da828d176e535c850b83a64dc75633eee779f8b908f59391ff1596ee7d8d668f320ad3c16fed11e73a4ae03363b5e9d9cca93efef6cbaafa6bd7e8eddd25ed73d7dfffca4", 0x82, 0x4}, {&(0x7f0000000340)="a89446090fb056e8ff765a63de00d13a64af55cb1b109767f2d4c4aeb1e57025de6868b3ceb7ad08141bb2d7b7e9db7d609be6d8da", 0x35, 0x10001}], 0x800, &(0x7f0000000400)=ANY=[@ANYBLOB="b058a83c", @ANYRESHEX=r1, @ANYBLOB=',huge=never,huge=always,mode=00000000000000000000003,uid=', @ANYRESHEX=0xee01, @ANYBLOB=',size=gk,huge=advise,huge=always,dont_measure,context=system_u,fscontext=staff_u,obj_user=proc\x00,dont_hash,\x00']) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) creat(&(0x7f0000000500)='./file1\x00', 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x4}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x401, {{0x2, 0x4e23, @private=0xa010102}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0xff, 0x0, 0x62, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x0, 0x5, 0x400, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) r3 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x40) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r6, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r7, r5, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) r8 = signalfd4(r0, &(0x7f0000000040)={[0x5]}, 0x8, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000140)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd=r8, 0x1, 0x0, 0x186c, 0x1, 0x1, {0x0, r9}}, 0x1) 10:20:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1068) 10:20:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 20) 10:20:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r2, r3, 0x800) recvmsg$unix(r0, &(0x7f0000000840)={&(0x7f0000000240), 0x6e, &(0x7f0000001900)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/195, 0xc3}, {&(0x7f0000000440)=""/156, 0x9c}, {&(0x7f0000000500)=""/217, 0xd9}, {&(0x7f0000000600)=""/83, 0x53}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/243, 0xf3}, {&(0x7f0000001880)=""/123, 0x7b}], 0x8, &(0x7f0000001980)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x130}, 0x2000) r5 = getuid() syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x9d04, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)=':9', 0x2, 0x7}, {&(0x7f00000001c0)="37c30f7695c8da1f2d6f2884d439", 0xe, 0x9}], 0x200044, &(0x7f0000001ac0)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@huge_always}, {@gid={'gid', 0x3d, r3}}, {@nr_inodes={'nr_inodes', 0x3d, [0x37, 0x6b]}}, {@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0x31]}}], [{@euid_eq={'euid', 0x3d, r4}}, {@context={'context', 0x3d, 'root'}}, {@subj_user}, {@subj_type={'subj_type', 0x3d, '-'}}, {@uid_lt={'uid<', r5}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@context={'context', 0x3d, 'staff_u'}}]}) 10:20:58 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 5: timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_gettime(r0, &(0x7f0000000080)) timer_create(0x5, &(0x7f0000000200)={0x0, 0x33, 0x4, @thr={&(0x7f0000000180)="4d0ba2146a23fb6c5ba4eb3add68c21422814e875c78d9d90b2994ac473a37c346d56f32dd78fdcaa9d8f82390314c076a513fd9427e7c46095a0d833b8c2d05758a18d3d67b0ce8b06900715063b796ed09998172caf5cdde99c4d081e54c88e9fc", &(0x7f0000000340)="92c908c2ccadbf3daa8fbfde67629a74c66c9a67f8a9f16502faf688d2da6e29d3c00825f40d3ca7eeb02948c1598be595eedaf4180972e9c2052884344bcbf563627760a0b7ee994d447246bf538db34fa526a7135f8a6f2f971af7c176bb1b478c3245f21f9741bc787c1531b53064e439e63f5b1ac4785cc1813edd64d03e8ba5a583841e24f5c646ecb7569f200fbc8f4696341f2a8654996551110d88f5d6bb421d58d614ea82c8c9e9ab955730a4"}}, &(0x7f0000000240)=0x0) timer_gettime(r1, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f00000004c0)={{r2, r3+10000000}, {0x0, 0x3938700}}, &(0x7f0000000500)) timer_gettime(r0, &(0x7f0000000140)) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r5, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0x40}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) [ 1631.447452] loop3: detected capacity change from 0 to 135266304 [ 1631.473752] FAULT_INJECTION: forcing a failure. [ 1631.473752] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.475350] CPU: 1 PID: 8608 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1631.476291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.477364] Call Trace: [ 1631.477706] dump_stack+0x107/0x167 [ 1631.478182] should_fail.cold+0x5/0xa [ 1631.478675] ? create_object.isra.0+0x3a/0xa20 [ 1631.479270] should_failslab+0x5/0x20 [ 1631.479760] kmem_cache_alloc+0x5b/0x310 [ 1631.480296] create_object.isra.0+0x3a/0xa20 [ 1631.480862] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1631.481534] kmem_cache_alloc+0x159/0x310 [ 1631.482067] ? mark_lock+0xf5/0x2df0 [ 1631.482558] __d_alloc+0x2a/0x990 [ 1631.483005] ? lock_acquire+0x197/0x470 [ 1631.483516] d_alloc_parallel+0x111/0x1bc0 [ 1631.484061] ? lock_downgrade+0x6d0/0x6d0 [ 1631.484599] ? find_held_lock+0x2c/0x110 [ 1631.485129] ? __d_lookup_rcu+0x6d0/0x6d0 [ 1631.489615] ? __d_lookup+0x3bf/0x760 [ 1631.490106] ? lockdep_init_map_type+0x2c7/0x780 [ 1631.490712] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1631.491395] ? lockdep_init_map_type+0x2c7/0x780 [ 1631.492012] proc_fill_cache+0x2f6/0x4a0 [ 1631.492534] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1631.493319] ? pid_update_inode+0xa0/0xa0 [ 1631.493848] ? pointer+0xa80/0xa80 [ 1631.494321] ? snprintf+0xbb/0x100 [ 1631.494794] proc_pid_readdir+0x3d3/0x830 [ 1631.495336] ? proc_pid_lookup+0x460/0x460 [ 1631.495879] ? inode_security+0x107/0x140 [ 1631.496423] proc_root_readdir+0xa0/0xd0 [ 1631.496943] iterate_dir+0x584/0x710 [ 1631.497440] __x64_sys_getdents64+0x13a/0x2c0 [ 1631.498013] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1631.498609] ? fput_many+0x2f/0x1a0 [ 1631.499078] ? fillonedir+0x4b0/0x4b0 [ 1631.499576] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1631.500253] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1631.500914] do_syscall_64+0x33/0x40 [ 1631.505705] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1631.506371] RIP: 0033:0x7faf66c84b19 [ 1631.506850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:20:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) recvmsg$unix(r0, &(0x7f0000001980)={&(0x7f0000000400)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000380)=""/80, 0x50}, {&(0x7f0000000580)=""/196, 0xc4}, {&(0x7f0000000680)=""/197, 0xc5}, {&(0x7f0000000780)=""/22, 0x16}, {&(0x7f00000007c0)=""/20, 0x14}], 0x6, &(0x7f0000001e00)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="882956684d2885e84fd46156083ef51c50af0c18a995c879944de2ac9e628e3dc214f7b0e6369669ad620a296772f73f44f9fda7c7d9ddd139f66898ec9c193700bb1c776c6d58da906c3f73d4523635029090b6541f79271324e4d98fc68ddcd15f06a51c1f0d45904ef3eaacf5a1d8b31c2b45ef33950b1089b90385137acd65231986587e3e5e64ac16ee161c5f35f94c931192bf4c1addd8fbbfd68bd866be87a78b119615a6e270bbe4faa479e5bba00108950030f454c218950e125c3b"], 0xf8}, 0x100) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0xfffffffffffffcf4, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="f212d422fabbc4243d25f820ea72e2f4046c0df213ec47903915c805f45770d5023c5136d5a7074726dc53e7f4d594b8f7d6f3e411c19287f55af9315962f7c52a8b77334a558b65d41e02a6ddf7483b652c0a519bd33150d38c72a941fe6a98dc80ac749a153fc4c36f339ac5f3626857a57a1497fa4f0e5fb5cc0269d74b0aff2819e3ba6cc69e635104d0c828def6a223e0860b41b04d0eedd03c447b5252973ce157da19280e6dd09e041daf836e2707", 0xb2, 0x3ff}, {&(0x7f0000000240)="04ee6447d6", 0x5, 0x611}, {&(0x7f0000000280)="679df29f7307c51b66b6b904d7495133ee6da62096b2230b40e16866cf747466bb1cea7f8348440bd8f080eafe5d2cceb84a1e1c3045630e4e557dff0a9ebf4d3efafe5bdb3cee700de46ed05805e2f89efc2bb7c7ff46a66a8636fb1c64281525b903e8e4046c209917", 0x6a, 0xffffffffffff0001}], 0x80008, &(0x7f00000019c0)={[{@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'iso8859-6'}}, {@fat=@umask={'umask', 0x3d, 0x6}}, {@uni_xlateno}], [{@pcr={'pcr', 0x3d, 0x2}}, {@uid_lt={'uid<', r2}}]}) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x106c) [ 1631.509211] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1631.514000] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1631.514910] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1631.515831] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1631.516763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1631.521657] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 10:20:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_setup(0x1d07, &(0x7f0000000200)={0x0, 0x4ba6, 0x0, 0x1, 0x288, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000140)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 21) [ 1631.688935] loop3: detected capacity change from 0 to 135266304 10:20:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa0, 0x13, 0x8, 0x70bd29, 0x25dfdbff, {0x19}, [@generic="2846f9487d078a06b410bdb90ba2", @typed={0x8, 0x55, 0x0, 0x0, @uid=r3}, @nested={0x68, 0x83, 0x0, 0x1, [@typed={0x61, 0x32, 0x0, 0x0, @binary="95e1d8cc78de2e7341fd328a2b48184bdeb4b855f30da5d118593d1e86aca3e473eeae84af93093088201a3b26715338bfe579e61c8e25e3743f8d7be70cbca9eab62cc126c182d646d71b0d768df82c9e14c5ce4e791469efccd002e8"}]}, @typed={0x9, 0x92, 0x0, 0x0, @str='proc\x00'}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24080091}, 0x50000) 10:20:58 executing program 5: syz_usb_connect$printer(0x3, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x5, 0x60, 0x81, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x7, 0x1, 0x2, 0xfe, "", {{{0x9, 0x5, 0x1, 0x2, 0x40, 0x26, 0x1c, 0xe3}}, [{{0x9, 0x5, 0x82, 0x2, 0x8, 0x3, 0x40, 0x5}}]}}}]}}]}}, &(0x7f0000000740)={0xa, &(0x7f0000000480)={0xa, 0x6, 0x201, 0x3f, 0x3, 0x6, 0x10, 0x6}, 0x48, &(0x7f00000004c0)={0x5, 0xf, 0x48, 0x3, [@generic={0x2c, 0x10, 0xa, "234de686d0c3833bb7ca51aa49996742e4351606b50c100ed2690c15230937334cef4b46a3c77061c4"}, @ext_cap={0x7, 0x10, 0x2, 0xc, 0xe, 0x4, 0x1}, @ssp_cap={0x10, 0x10, 0xa, 0x6, 0x1, 0x2, 0xf00f, 0x3, [0xc0]}]}, 0x5, [{0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x280e}}, {0x1d, &(0x7f0000000580)=@string={0x1d, 0x3, "639465ac7eae69434a7a40240caaa188d914c0f908bc7e21cd982a"}}, {0x6d, &(0x7f00000005c0)=@string={0x6d, 0x3, "4b86e97acb7f442927bb30526571ba5a81654bc7773c66620da5c01a5f2953f2032ff3edc7e0b0441c19e300af29d548d00e8eef57c58d08517fd7d70fc1e24fece9fe773b75a30b082ee66ed98ff06ea4015fd290ff5403720dbe64bf22a1b87f2e78c7f4e9e3be7cd21a"}}, {0x9a, &(0x7f0000000640)=ANY=[@ANYBLOB="9a0301fd97ba8205b156181ca008dc5fa08ed9d8bb14a16c54adb63f995a6cdd97b74d4746b8370aec860d990e4bbc82dff2ed1e0e396b40ed7f2ffeeb70bc42c503c7a099a2a93672897be9e187fa8606cb78860716bf6fe4f7f7b69759c1c9af53f603d9e14d1e4fe6824b7c70df61710b4ee4ce6f5a0fb91c473e19ca0edc4693285fda3e05a7a72ecb74d700"/154]}, {0x4, &(0x7f0000000700)=@lang_id={0x4, 0x3, 0x2c0a}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='aio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x401}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x50000, &(0x7f0000000340)={[{@xattr}, {@none}, {@cpuset_v2_mode}, {@name={'name', 0x3d, 'proc\x00'}}], [{@fsmagic}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_gt={'uid>', r2}}, {@appraise_type}, {@fsname={'fsname', 0x3d, 'proc\x00'}}, {@euid_lt={'euid<', 0xee00}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@euid_eq}]}) [ 1631.725144] FAULT_INJECTION: forcing a failure. [ 1631.725144] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.726927] CPU: 1 PID: 8648 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1631.727803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.728860] Call Trace: [ 1631.729204] dump_stack+0x107/0x167 [ 1631.729689] should_fail.cold+0x5/0xa [ 1631.730176] ? proc_alloc_inode+0x18/0x200 [ 1631.730732] should_failslab+0x5/0x20 [ 1631.731221] kmem_cache_alloc+0x5b/0x310 [ 1631.731748] ? proc_free_inode+0x20/0x20 [ 1631.732271] proc_alloc_inode+0x18/0x200 [ 1631.732793] ? proc_free_inode+0x20/0x20 [ 1631.733323] alloc_inode+0x63/0x240 [ 1631.733797] new_inode+0x23/0x250 [ 1631.734248] proc_pid_make_inode+0x22/0x220 [ 1631.734805] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1631.743385] udc-core: couldn't find an available UDC or it's busy [ 1631.745460] proc_pid_instantiate+0x50/0x1e0 [ 1631.745484] proc_fill_cache+0x373/0x4a0 [ 1631.746323] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 1631.746846] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1631.746861] ? pid_update_inode+0xa0/0xa0 [ 1631.746878] ? pointer+0xa80/0xa80 [ 1631.746899] ? snprintf+0xbb/0x100 [ 1631.750546] proc_pid_readdir+0x3d3/0x830 [ 1631.757410] ? proc_pid_lookup+0x460/0x460 [ 1631.757963] ? inode_security+0x107/0x140 [ 1631.758514] proc_root_readdir+0xa0/0xd0 [ 1631.759040] iterate_dir+0x584/0x710 [ 1631.759521] __x64_sys_getdents64+0x13a/0x2c0 [ 1631.760112] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1631.760702] ? fput_many+0x2f/0x1a0 [ 1631.761174] ? fillonedir+0x4b0/0x4b0 [ 1631.761695] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1631.762371] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1631.763079] do_syscall_64+0x33/0x40 [ 1631.763565] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1631.764235] RIP: 0033:0x7faf66c84b19 [ 1631.764733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.773787] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1631.774767] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1631.775683] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1631.776596] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1631.777523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1631.778440] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1631.847884] loop3: detected capacity change from 0 to 135266304 10:20:58 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x48680, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1074) 10:20:58 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) pipe(&(0x7f0000000040)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r3, 0x5453, 0x0) ioctl$FIONCLEX(r3, 0x5450) dup3(r3, r0, 0x80000) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000140)) 10:20:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r2}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0xffffffff, 0x0, &(0x7f0000001e00)="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", 0xf811, 0x0, 0x1, {0x3, r2}}, 0x7f) 10:20:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 22) 10:20:58 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3e, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@v2={0x2000000, [{0x8}, {0x9, 0x10f}]}, 0x14, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:20:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x107a) [ 1631.966158] FAULT_INJECTION: forcing a failure. [ 1631.966158] name failslab, interval 1, probability 0, space 0, times 0 [ 1631.967988] CPU: 1 PID: 8675 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1631.968897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1631.970107] Call Trace: [ 1631.970466] dump_stack+0x107/0x167 [ 1631.970951] should_fail.cold+0x5/0xa [ 1631.971468] ? create_object.isra.0+0x3a/0xa20 [ 1631.972060] should_failslab+0x5/0x20 [ 1631.972553] kmem_cache_alloc+0x5b/0x310 [ 1631.973082] create_object.isra.0+0x3a/0xa20 [ 1631.973659] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1631.974320] kmem_cache_alloc+0x159/0x310 [ 1631.974858] ? proc_free_inode+0x20/0x20 [ 1631.975030] loop3: detected capacity change from 0 to 135266304 [ 1631.975382] proc_alloc_inode+0x18/0x200 [ 1631.975394] ? proc_free_inode+0x20/0x20 [ 1631.975412] alloc_inode+0x63/0x240 [ 1631.977686] new_inode+0x23/0x250 [ 1631.978142] proc_pid_make_inode+0x22/0x220 [ 1631.978701] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1631.979442] proc_pid_instantiate+0x50/0x1e0 [ 1631.980009] proc_fill_cache+0x373/0x4a0 [ 1631.980526] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1631.981311] ? pid_update_inode+0xa0/0xa0 [ 1631.981846] ? pointer+0xa80/0xa80 [ 1631.982310] ? snprintf+0xbb/0x100 [ 1631.982786] proc_pid_readdir+0x3d3/0x830 [ 1631.983325] ? proc_pid_lookup+0x460/0x460 [ 1631.983870] ? inode_security+0x107/0x140 [ 1631.984410] proc_root_readdir+0xa0/0xd0 [ 1631.984931] iterate_dir+0x584/0x710 [ 1631.985518] __x64_sys_getdents64+0x13a/0x2c0 [ 1631.986102] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1631.986687] ? fput_many+0x2f/0x1a0 [ 1631.987156] ? fillonedir+0x4b0/0x4b0 [ 1631.987655] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1631.988332] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1631.989000] do_syscall_64+0x33/0x40 [ 1631.989496] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1631.990160] RIP: 0033:0x7faf66c84b19 [ 1631.990641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1631.993008] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1631.994006] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1631.994916] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1631.995841] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1631.996761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1631.997690] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1632.279687] udc-core: couldn't find an available UDC or it's busy [ 1632.281116] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 10:21:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x20070, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x400, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x6010, r0, 0x10000000) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x0, {0x0, r3}}, 0x6) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:13 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x301540, 0x2f) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) futimesat(r1, &(0x7f0000000300)='./file1/file0\x00', &(0x7f00000003c0)={{0x77359400}, {0x77359400}}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="740000000306010200000000000000004400000205000100070000000900020073797a3000000000050001000700000005000100070000000900020073797a310000000009000200030000000000000005000100070000000900020073797a300000000005000100070000004500010007000000"], 0x74}, 0x1, 0x0, 0x0, 0x24008080}, 0x20000050) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r6 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r6, 0x0, r5, 0x2) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x6, 0x8, 0x7f, 0x3f, 0x0, 0x7fff, 0x202, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x42, 0xc8}, 0x41002, 0x400, 0x0, 0x5, 0xc, 0x76716f4a, 0x6, 0x0, 0x2, 0x0, 0x6}, r6, 0xf, 0xffffffffffffffff, 0xb) 10:21:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='ntfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) creat(&(0x7f0000000040)='./file0\x00', 0xe) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:13 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0x2) poll(&(0x7f0000000140)=[{r1, 0x8}, {r1, 0x4400}, {r2, 0x1}, {r0}, {r2, 0x2002}, {r0, 0xa090}, {r4, 0x10}], 0x7, 0x7f) 10:21:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x4000) 10:21:13 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 23) 10:21:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x6040, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:21:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/tracepoint', 0x309000, 0x10) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) ioctl$FICLONE(r0, 0x40049409, r1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000140)=""/4123, 0x101c) [ 1646.347783] FAULT_INJECTION: forcing a failure. [ 1646.347783] name failslab, interval 1, probability 0, space 0, times 0 [ 1646.353651] CPU: 1 PID: 8717 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1646.354533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1646.355618] Call Trace: [ 1646.355964] dump_stack+0x107/0x167 [ 1646.356501] should_fail.cold+0x5/0xa [ 1646.356995] ? security_inode_alloc+0x34/0x160 [ 1646.357605] should_failslab+0x5/0x20 [ 1646.358123] kmem_cache_alloc+0x5b/0x310 [ 1646.358645] security_inode_alloc+0x34/0x160 [ 1646.359252] inode_init_always+0xa4e/0xd10 [ 1646.359801] ? proc_free_inode+0x20/0x20 [ 1646.360329] alloc_inode+0x84/0x240 [ 1646.360792] new_inode+0x23/0x250 [ 1646.361239] proc_pid_make_inode+0x22/0x220 [ 1646.365816] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1646.366492] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1646.367229] proc_pid_instantiate+0x50/0x1e0 [ 1646.367795] proc_fill_cache+0x373/0x4a0 [ 1646.368313] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1646.369083] ? pid_update_inode+0xa0/0xa0 [ 1646.369637] ? pointer+0xa80/0xa80 [ 1646.370100] ? snprintf+0xbb/0x100 [ 1646.370573] proc_pid_readdir+0x3d3/0x830 [ 1646.371134] ? proc_pid_lookup+0x460/0x460 [ 1646.371674] ? inode_security+0x107/0x140 [ 1646.372244] proc_root_readdir+0xa0/0xd0 [ 1646.372778] iterate_dir+0x584/0x710 [ 1646.373262] __x64_sys_getdents64+0x13a/0x2c0 [ 1646.381853] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1646.382481] ? fput_many+0x2f/0x1a0 [ 1646.382948] ? fillonedir+0x4b0/0x4b0 [ 1646.383444] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1646.384138] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1646.384807] do_syscall_64+0x33/0x40 [ 1646.385290] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1646.389966] RIP: 0033:0x7faf66c84b19 [ 1646.390446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1646.392871] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1646.401872] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1646.402790] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1646.403705] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1646.404648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1646.405621] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1646.413595] loop3: detected capacity change from 0 to 135266304 10:21:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, r2, 0x8, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0x1c, 0xc7, {[{0xe7, 0x6}, {0x6d, 0x6}, {0xff, 0x3}, {0x9b, 0x4}, {0xff, 0x2}, {0x3, 0x4}, {0x0, 0x1}, {0x9, 0x5}], "64063ef96f0b8661"}}, @NL80211_ATTR_QOS_MAP={0x14, 0xc7, {[{0x2, 0x2}, {0x8, 0x4}, {0x2}, {0x52, 0x7}], "db1ee5d51e9f427c"}}, @NL80211_ATTR_QOS_MAP={0x20, 0xc7, {[{0x1, 0x3}, {0x2, 0x5}, {0x20, 0x4}, {0x5, 0x7}, {0x61, 0x2}, {0x5, 0x6}, {0xa, 0x2}, {0x3f, 0x2}, {0x8, 0x3}, {0xf5, 0x8}], "c38073e7810e018e"}}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008000}, 0x40) 10:21:13 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) openat(r2, &(0x7f00000001c0)='./file0\x00', 0x4001, 0x8a) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r3, &(0x7f0000000100)=0xfffffffffffff674, r4, 0x0, 0x0, 0x0) linkat(r0, &(0x7f0000000100)='./file0\x00', r3, &(0x7f0000000140)='./file0\x00', 0x1400) 10:21:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:21:13 executing program 2: sendto$inet(0xffffffffffffffff, &(0x7f0000001cc0)="62d38bcd2c6bdd1583119d56cc4db6f6c041d9f572f732930c805708a869519876e397f589ffaa4e97813f4a8c50f7a12899fafd569cbd18bcf725ed432244d59f23f48d4019a48a3c8aca8aa8de86d5d08c42154f5330724ea6aa0c7531e70c6f1057071585ab21bdd160ffd24054c74bede646ab05e9046e11170451a403611146b1edf429f0dfaf04ecf3dec1bd7cac31", 0x92, 0x4008000, &(0x7f0000002e00)={0x2, 0x4e24, @local}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) statx(r0, &(0x7f0000000340)='./file0\x00', 0x4000, 0x20, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="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", 0xff, 0xffff}], 0x0, &(0x7f0000000480)={[{@huge_never}, {@huge_advise}, {@huge_advise}, {@huge_within_size}, {@mode={'mode', 0x3d, 0x34}}, {@huge_always}, {@gid={'gid', 0x3d, r2}}, {@size={'size', 0x3d, [0x74, 0x0, 0x25, 0x78, 0x34]}}, {@mode={'mode', 0x3d, 0x5}}], [{@dont_measure}, {@euid_gt}, {@obj_user}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x81}}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@seclabel}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_gt}]}) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r3, r4, 0x800) syz_mount_image$ext4(&(0x7f00000005c0)='ext2\x00', &(0x7f0000000600)='./file0\x00', 0x400, 0x9, &(0x7f0000001ac0)=[{&(0x7f0000000640)="4fa4b32c2cced461c21569b95e7e968c6d9886ca5a6b5828cfcee6d77be5f5f06dcaeb3bcea6b7305643101b387314f12156ebe908306702d4cf9f820b7a835ed4", 0x41, 0x52bb48c}, {&(0x7f00000006c0)="1df879f07a5a6e722854c5af4753cc244f8f4870064d82630d2609e8de131a1affcb0d382a7aadd7ed859f82e3d01a603cc53a059cd9ace9d214600b592e8ce12f6d67d773fbdc54eb8aaaae0cad3f71f8f26a0cff7fca7835aa191820fad08cfe026837b9b2c93bab4bf079c6062f4ff7c76bd577b93033087f7c4f7f00c13fa14b2516f3ff2403e0fe3721f6b4057300f02728b2ffb2fb5d9bb88a216d29db79b94f1eb69dbc6548cb65051a301f8974aaa6ab84cd11ce051101d6d56f65d10279d225ec7446c40c1c2ca940dd3b2e710269131e6d", 0xd6, 0xbc42}, {&(0x7f00000007c0)="a2c5c938ec5dc310040a234f460d0e71044a", 0x12, 0x8}, {&(0x7f0000001880)="3c93a68d416cf1ac7ff834c1be461e98abb331a6e39e7c7738b0b62e3bcc09f64b2e0136bebd8ba562c5ff78f98f1b6da8676b7f5ab0635a790fade681a98b8f717db85bd67f85b0380eb19345f392add690d1383746640bd69e8cf60b88dd9f3f86544a04dde390186e250ae9d123bb1c66d3009952ff1aed1364fb4ed05992f99d2454b688c03937a88f4ba9e4a32a629bdff6a54de12ed36e54d74d19698398f9cabb5f37e47d7fad53e6094b5fa4e714c450984967764ece9775adb7cf3edba8abbf4ea94de6b932dc299ff49c6fce8b22169008b973f76cadd0822edfcdffd27198e9168efcc7e7c3", 0xeb, 0x8}, {&(0x7f0000001e00)="3af67d47436738d2e3d8ee36147e5e2364b296821ab49c176bbe2272806f9dc5f26cfef1eece9ce8edeb14f3fa6ec89a60411c1303a5483cf89537611f1afde80e39a28195d08febb4c835d29dffaa7c9b9324784b9b6698d089daf391454d57dde1f9080e0d81abec2ccf090b7f89d80f543fddfb50f8fa6933dca24e86d9216f546d2c001fbca76ef6f82da4fb79ee1b991d0d52178e11d23b55f914dc6d3eb5f34dfa3ed4823c347bf90435bbc96bd8d4bb48064769312c38a31432a5a60a2c572a4e8a7f2c1e5f3ff679bc080f95dc964cd0ae088161b05802c0b7a2aedb0f4671b8bc30eb0d5ca77319bf4e8ce3553153df89eb6bd1d4632c16eef586760bea06b5247ae6764b9dbcd8539a04e1d7b3b0cc66fa05f4372ca4533c2fae7dacd95c3c2e9e81ade670cf234955de0296f4e5d117db43e3acfa08419d3b4b04c8d24486272213dbf8c1ffa21dd6a40ac820dc684acdbcedaec5cc40f6ed46b88a0c976ebee11df33b3175178638d38ec3cf8d790043ce40f20bc57abc3c266c778ccb788eb27e34c6722a28d150bd97defafad0f10097b5378963a0940f7ad49f7ff4971dfffe0fbb5ecbc777cd3843bd3aa38508ef68c72fc728cf9407f400b23ce091e6923d74b90ad8e39a86efabe710e843bdaf8a15ef83fa12e09009a8e7dcb139e31203cf310aebfc5ddcf66563d07fa9614c7c95f100d2d5b49e4431313660274edec2b8eb3de7c40fb9b0e6aef06885627861f0c1ab41a4ed17ea9c2b3f2aff9bfe6fb2ab076b7ffce8eefc27fac0166f0ac721a183df9eaf6b6c6e0b5068dd3dc5abc5128bc707130ed3351a56ce0b6dea7253fc18897739d5d3df0145681fcf82a0a0c69dfbe1be5410aa6a218fb1225af988b25ea4f58624fdc6fac2c07c479d2bbc2b07ffc0e985d786ae939fcf1ed7ef77cafed34943ce38cbd1817b8fa081eb4c7e6d5b01a03f8c1667c3f740328398ce9995515d0cc4241525b742b2928a9b55f4fed0334e1ee00355f21adbe1df8da6a896ac266973a85f00553ce9637957f80ce7b09f0e597e244204ea03517224d60b870400d9cb1aac58b0cabe7de488b010eb0507917d0a1d05ec7f676eb70feff18e521969b6c3dd3ed93ff2058f96c02fb824feacfcadc733770fd9081c60200baec72221abc3fe4398b37c475a1724c8159c9eec3b4fc1a05f2ff2c8a89780293ea1b5fd9a85df20200cf3865460bef1b9f1dd113db7aa93b212ce19d477d7cc6af038106cd2bc83c75ebd4fa407dff98182ed4b652794bae093d7588a81d8b633499cfb34899f59f21ac6f131b2e838c9a0f020e8d901ecade9c65d5d6f9a114aad52eee6f71723fe31b5215077d3000facd795e052e8e5b33043f561ca8e60ba798c70748b578f206aa88e60135419d2be7e77270b865afa252ee9fb2f8e816f8845ae892e1da4369b07034f82df34d64e7bcd110fd7e6fc36d3aee5acb87839ba9a0e857ebc59e57d66faac2cc9f9c971eca05961abed261cfca18fa585442acb048eb6a594a4e4b1f3eb0bec922af6aa25ff181026cec34114c9c3ef09259bea503d316c80f801877ed18b6182be1003b16eae8034cf88a66e6be7442269335ddff5fcdae2eabeb2aecd888723df37eaec20ff69f9b643decdc817c5a962d91f3159b7d433e423bdd19d045093637e3b5caacf6aa3f628fe87b06385ae00c241d9c6f3c7db4754cdb948fdfd35370d2b6ba6ff906238b3b054101ad82932a40433fc93a64daba52f77e1201ef696607a621147fb39ea2eef897f7dd8de52ec1b024db0f3dd07d689c5b0d447adfcdd7128843b9f96e09b77ce8b9b1e1b7585345a3ff227348f28aec95d4a3aa0b6486d09b8ee88d3af74c15f458853d45fa6f0db6048b961002a108076f987b16cf4c9d95e0ddae8998ee803660fe1f8192ef683f019c469d79981bef9527400f42aa27cce474f726d7769f535e07a521110296c67328bbe0d0e7bacfe01a874da8d310adca2c30e5afa97bacb2da892d1a75a0c97e4feac9169c02528df3c8ebeff780c6da979759214158679348479d2053438f730ae8bc4021b84db11217667f29f53177d9e5b8e5923e68dc0d5ca9f28453cd878bb142a977100f918f9d2abb49250982327612d3e7d870262f8d429dffc76979ae7552b04f4e1ba326511a7f2dd3bea27b1df8bf19ce7221f6e58f8a92f5f0e7c52c3951251981e026f1e2a215dc93b91db0ce7bf6ca32a28d89b5a2fd4dd7e434518f41a1d50c059dc6ca61e2467036ccf135b2558f97ba6870821f53978628d2a7f1f3595ec52e8ef15cf67aac49500f1ab650d6c30a4a50aec3aafc4b1014d04a958eade63a262aa741c83fdcac6c9dd79e52a0a1c3ba387ec9fa692c0c0823667f30cee83c5b7bfd3887bcc5925a80bcc6fd27e89e818e96129a94fb53eda2a71761a92e611dbb6428ad5b6a3e678647d146b71866b20348ba9c4d2954ff26088194008f06f14e3b4028a15663c4171725708643917bfc15cabcbe5ec076d560c84eb0f1a8b53f65c53653ca745013edd7d298ca5443fe066d4e9cca32fb202f83358aae5e52054a5652415d55e9fde8b76456761b2f72ca1c32f55595de1de86b217374dc3481e6ffbd591e6247a7c3046e3a39dce98382f58c2207217f64ad7e9e5ea08cec25384e5921dbdb302230b1a960320887103649b03c2e9b7bc3480d313d7ca7adf46c034a7b87da08a21b31d1a4a24ebf536091a0c5e5d127f2adda3f6aa8115c354f4e0687ff0cd9b6ad0f6dc0f5493a7b0d8027fffbd73ea11e265f19178db5c19de8ccc251efd8d4d97e9df0fc8c78c2ec753b4421ed57137718c8f176f8814940f18dbcfae371300ba82b0fbd31e18a7b45b5d96ad4a3aee03dc182d8d19544e805b24d7539581e2e9209a71894f10cdc861879d33d7f38d03e098ad68b766b64759743ce321cd0d9152573f38a5baeaf4ceab60ed4e1ab30822e745607aacc9d7555580ee7d84420cc5309e39b0bc1d484ef84b28810bcfa8353bc45ecf34aadf2136fd0b99c9d5d5c885cd0d283d1a4c2e15f12c3906c5b81d6c2f2123f78f2e86f8cdfd7a92c81b3f3fb602f2537aa0f0098437c0e6a215cd3a6a0a7dc861dc273f7362cae1938602fcef25279dcb76e91ae1e17df71a8a058bc8613c82bd7f40ac4494bd649576f0d221361de648538d507d266c0236a582c743b12a71004a4a517e08e7b2eb1d9b96ac53120f0033b5ab9b8f306e7bf4c67133c08bdeeb2f3028b6bb5555065dd65ba215a502b57729abda162dbff25903b28083640553579e182a84ac3b71a16f521e1988ecf15f0c2b098bd5815626d15a48ae4d886fec7ee3119c2fbf8d0b1087215d203c0975a23b41885bd490c7f8d54b2a8da61870ad8a9f902ac0e94cd1c2e1099eaf9a7ec8eeda2dbd9cc2092d726ab22d7ce3807043ea50cb18913cfd85cee2194f99535edb522adf59197b32768d7a4b11c2767582efa9b13d16e9f871d838a3b5f7ba9e48b18b5814b87c6ced05bee87b22b10807d895e3a102352009ac50d340e758820395fb51f1e5698ac79d9c1563a67dfa46ce1db18db554bfcdeb2fa6607a1a56a9af9088118f8e134618c2166703e19c349c682b9b3e71d0d5c5c6683bb7eeaf30e52aa667386c4e67d37e72bee142444ecad7a37a57dc39137b480f92cda60ce036fff6e3acfd3187c1a62e1dfb0a3adcd9409ed63cd9d7cc2e66c6f43dcb4915905cd61dc369233e143ab16ebc65997a8fd7093dbdb161695e9a3a5a6f7af74bbe7683b8c3cae47f2a987054f7f4f205d1fbfacb2d14606cab106d1771b12bd031386b7f20b32443e6488ee226efa8decacfaf2266dfabd1b03d376859116fc1aa70b580e64c24bdcfa76c4d9519f19c534b552de981023afa2dfb03c750c6fa33129ba95920a1502acf48636f6e515000108e1a0d24a941ca90f0900497867e7d8f0353a2838e2ad769f7083da259ca0b79721c98928b026c3f60e2ddecfc7e161a60452543fc9937014925baf79af3c5a38f3bdd283e709df164ba116e92c27536d9da20d9a37cc5a5b90fdd17f78ae91db1e1004894dddad4b62f50b1b5d66b0aae1acb024a0b8db944b2236ef300d1e5b1dd7a99c5c554b93d67e5e6107491bc96fb96c164e2edc39f8eb20d9221cf6ab1f559321c0399b28561b4041ffb90a77d50f1ff6fa81bf899dc04f0943c6d60f8f88a313a45a006849858c92aea6625a340e95eb4f6fc3de450d9069b0e51d5309eccb70e06c76d5707cc5e07cbc911e7173617f46dec27aade833793b14bff2a2ce657a66f32441ee1b6cd49a37ae06aa795409b36bb15a1b3077a1975272fcc1a3c9bf567637b1fefc2dbea0b56638d2a98057f90c154ba8294e6f4d413fabb637a464ca8e90b42307d3dfa30ee169474a468f0dc0db3550b380cb561e027c48f2ee0a68fab6c06342934c1a71b722f416f138fac9ff03bb911ede5513e96a6ed8b9cd80fd2f5f4fba0d39fd92a774cea49c9019843c6781ea92a35db4b3537eed7cfd4df2afc566c34beedc921c54e5ef28abaddaac7cf806cefe0f93c2f7eb929c9cb9d0fe1ecd6a74d052498447ebc62ae704e80527441fdf244b9c16f6361f14bc81390379853cad1515a85d58df469b137389f37c14ffcbe63d9c7c4dc142c97849f7d593f1b90ae07c5eab67e4be00a9a8cb7c12745d15eac14732a02d08640114b73f37efac4763bc4e6dcb0b2676159c40fd0c9b509b3783e56ab9177ab9a3f7abebd5781d25ae027e6afa315831c967778326eb19ecf8dfb417c30a2994ea9ba6cfd4359a2be8a33f0e47a6613bd0b7ef8a37443d783fecd208d8ec8d3fa16fbeb00d319a60d6bfc6b9edccb30873510111b1baff33bc6647cbab32a13883a9f8aa881898d3cecaa11250f58c87b4c9985e40b33842c49d7e7d3a64ea7866894b260f6203121c54c04ea4949bc73d45956539310459a4ed70a4a21f9552774c408beba5a270e66d576586bfa22562db5d630c54a615df321c536cae72785b4d1eb249976531cbaf4814514ce139b3f9f971636430b24eb7525e3ae087d1a503b923c597f0ffb491239176bec2e3b370d895843570160848c9a177b7c6a7568203266d89514117f414f3ec3c78f9f082ca2689cdbb8660c2b2611dc8a6c2a8bc8bc9714247ee87308dbab24c5e2348465d00db04bd4bb34b262bcfeb70208246efa1893371fc28f5531aeb826cd538bd84fa68267009ae17ff6270157127d301f1b534c98ecee6bb57a102e589203644852dfb3b995439dccd1d6b43e386f0bf8058b19356746d364491614166236330885ee19080d177303e3aad8d4e59583a64f4b4f34e3e473784e57356bc256c0b88a80dc63845ce9b20aae4643c9f73558b12d9dfa094f2714e61395bd72e1635e99baa505653415f62300fe3e97df394e8183eddd91114984b9a49f10b7ed69d18e067d567253b50a829c795c38f64ec74421ab0e2853ba0962270be52ea2ae0757f4b5d45477eb46052c52ef5e133f8585e1842c89c02bf6e2a45cbc9407b64389e3dde5832bfce733de7cab06f380f8584e0875c10f801a8f126f65195bcd333ec4cd9ceb9700e501c22664c10dcd4995a72755c2e1c2c82e9a3c8573a9f5a9518a04eb687ae9ad32abb2c7a63cbed0459639557720768db04c3dc8fb43ed049b7acff0b96614f4f2d7dfe81179321e085808c0157914dfa2bf76085c1ba594c26afa436faa49f032018148f3fdf54a600b0a6aa07007fbd719060fbf16", 0x1000, 0x8}, {&(0x7f0000000800)="53260ee78c623d43db7516be90dad6272a811ae16d4abbb26c3990a215943278dfe853cfdb9df4", 0x27, 0x80000001}, {&(0x7f0000001980)="d9292c62ee969cb266ac25f7096c0d6c1b747f402c0f326be274992bf16a09f00e6c6d8c1afa668b9eb3d69bbb258f50753651d990add9d7e543487fe363ece0cc3e36fe9ecbaae73d0109509ca60ad5469c1a320b8fdadb817bff9a175ae1ad6ad85024c4", 0x65, 0x100000000}, {&(0x7f0000001a00)="e0bbce0de8d90a24a8affe72b14065ae83d4db83c558567194fb2aa18fdef6e10d11acd3d94aaf043fd020b2e81c2fb1eeb248bc45a2aafdac3c9c5181c58bc0085bf7f90b07a41688868d3ac1e70f03e731db5fc3006159144c5745482a13c4a0ae3d3dd9d18c583f7eca0e974656f2c968fab76f25fca2c57476e3fb04d898e8ee", 0x82, 0x4}, {&(0x7f0000000840)="50361388dbf2497717ec5837ab0446604bf8e33bf26cace5024e8b33daa9316093e8be5d539504765c93305b93d6ea82", 0x30, 0xfffffffffffff6f4}], 0x40, &(0x7f0000001bc0)={[{@block_validity}, {@noload}, {@dioread_lock}], [{@euid_eq={'euid', 0x3d, r1}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@subj_type={'subj_type', 0x3d, 'huge=within_size'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@dont_measure}, {@smackfstransmute={'smackfstransmute', 0x3d, ']'}}, {@uid_eq={'uid', 0x3d, r3}}, {@obj_user={'obj_user', 0x3d, '-{\\'}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) [ 1646.527603] loop2: detected capacity change from 0 to 130560 10:21:13 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) name_to_handle_at(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)=@OVL_FILEID_V1={0xe6, 0xf8, {'\x00', {0x0, 0xfb, 0xe3, 0x1, 0xc4, "d0946d8e2ce72aff9aa14b5ad9113587", "ffd73ce2c16d9674ca1d72c67b748acb6b490f316ef4e3690ea1057a6d75e2ea0e7a008affe743c6c5093e83cd627276456a0a013080f6046d89013bb79bbaa52225d9e497fe0ab2df1563363da67886e0808576269d18ba829d80766ebe05f005886e54361fb4cca9f3806fa30c20dea1b730d4f3c8a45892f645564bc513f83ee15e337fe2ba92d99db58d6c3e59e4cb24804a248d3fbd9249b23da603a303c36cc04e3e32ada94c7d5264d0c26c2da6e14c29eddb1f2a409b98d52a94722edd22b94908de4ae4987999b3e06b"}}}, &(0x7f0000000240), 0x400) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@empty, @private=0xa010100, 0x0, 0x2, [@initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, 0x18) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:21:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) getdents64(r0, &(0x7f0000000140)=""/80, 0x50) [ 1646.536842] tmpfs: Unsupported parameter 'huge' [ 1646.618432] loop2: detected capacity change from 0 to 135266304 [ 1646.624374] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 1646.653268] loop2: detected capacity change from 0 to 130560 [ 1646.659447] tmpfs: Unsupported parameter 'huge' 10:21:27 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x5453, 0x0) ioctl$FIONCLEX(r1, 0x5450) dup(r1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:21:27 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x2) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000140)={@loopback, @remote, @multicast2}, 0xc) 10:21:27 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000180), 0x5, 0x40100) pwrite64(r0, &(0x7f0000000340)="b022fda94d5d373db2a0d39f19a3addc8124c97a3419b0c57ce59a57f7db5b24b62651e073f69aebc22428f2d332b3eca5b636d28345c91db3c689a91309c12ccb51d09c9e2b53306347be8781c85576cfbff01cba2280d57b4fda7ce9ef3b84311c08ed283bc16471cf1c2619e1d13b95bd77f640207161569d1c5d6ac1307b9982ae8d0d0e12d9f8f2b765e006d2f041ff220f6c57cd16a40aa9c26c59eeff47cbc8b80421cb86ca02b9ac3af1b85398f4f83954427e6a197e5900f30eb6a152350b44c46a945c5091113a", 0xcc, 0x9) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r3, &(0x7f0000000100)=0xfffffffffffff674, r4, 0x0, 0x0, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000140)=0x4) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) r5 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) sendmsg$TIPC_CMD_RESET_LINK_STATS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'geneve0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r6, 0x1, 0x6, @local}, 0x10) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={r6, @multicast2, @local}, 0xc) 10:21:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x200, 0xffffffffffffffff, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @multicast1, @initdev={0xac, 0x1e, 0x5, 0x0}}, 0xc) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) sendfile(r1, r2, &(0x7f0000000180)=0x401, 0x100000000) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) r6 = syz_open_dev$vcsa(&(0x7f0000000380), 0x100000001, 0x200000) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r8, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) io_submit(r5, 0x7, &(0x7f00000018c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x3, 0xffffffffffffffff, &(0x7f0000000140)="c002d3a620", 0x5, 0x800, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000000280)="9fb86b4796af65f4a7ac424348a572375f354bfe2fdd61ced1dd16acbe196ff95b6b6326c2579468a7c58114dae7156a4e720bcb92e576d183be9a19e598e93a726e3269c07d72d061b1e2218fde1e648a6c25d159a517da6979730138cab7acf8ca27ef23cee585eda0b4034dbd09c265882103db88e5a0b350e9d35ab56656b555336410a1cbe5b61a851df1761712d3b1eebbe2db28bb506866633f3a57407ef32d0acde5e9b7bbb243f0c71a830cf59d7852542585ebc2deb4a507c63a7fd0639f87152fcd4567037a74df9f8e1a734f9c85241739d5b8c43dbcfaf934ffad03de839edc83", 0xe7, 0x747d, 0x0, 0x2, r6}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x800, r7, &(0x7f0000001e00)="50fdff2c64225e65b52f2bc7ae6bec73d449406a9ad0e45583d25e932f5f2b7d73dc8cfc6c91ca928340d169d664bdfa1f7a16dc5dbf981d831fb4f811420b2f265e21e381f8e89d00381c1bc111a3fe40f24567571abf35df72e27fac3ae77f6babed27ba97222db448852e6ff96759e99ef40639323f719409aa6e476f66168e81fad875db9d90c8683e41c0c243312cc9372fb5cd10097c86c02f4811afa2afb3854dae98c79398800a28ec454766170c23f90a1cd4397f5e2a5976d5e3debbd730378e6e2b7871743b39ed7af323a6c43fddb5bab2a42b305f23579110f614d6c57eee0cdb8881450cea89bcacc1672ca35f89593a9b1455c894cb2c3a6e346dbe78d91c7b67d54aba02eac5639146717588d1be75cefa78a055b6e561a4abe0c4870020a07efaad63267e7db0c2641294f74303402f862bec14ac1f0a2f317faf62db8c9cf9eb54fdcaa5cf5b7a2981c9850a444f7c06a8fd9d309cf8b8688e645033e9ff360762307d9991d2d0badd191f917a1594fd15f96750fed785bd740b19d893d8564bfe831e707f391ec3874b21c898aa8216b608f2440e7f4df3925258339055f5aa2fd6a902a2c716f96408b9b2bf3a92784f9b9045debb5e78eabd11b5edf8fcf4cfc691bcb5103a1f39cb5e415c54142f2c267e2ab59577309b61b72f0adf3890ed0e14c95e584a75e5396505043ba9cee948875f685c3bdcda7c40e5ae707370cc1a0650c5256f6de1709dfc78f8fef89e10fe93cc1af0e0797e0be7c5a74443503f8d1965d6e0f9ca4766e5fe14c128afabe8e127f40935717ce0014f6acf313757b0fd5680e7131693c46acc9ea9e10539022a636fac7728ad2ea868a905ab316fac091d0fcd02a9f9fe20183f830865f660dcc40f45ac46d986b05c0c98d4cf7ed0cc0df9f700d45168d970b05b7600f794607bae607ce56bcd1ab035abba32d1ca03e70cbf3f38f9a972f2c635678caf83e3e92232c2e68cc250d4eceedafd7d0a8aad37a4fd6df1f744f45e8c059f3e0d0123cc9fbb1a12403adeec1d7c6d6ee7406ee6c14167ca17843f135bbe501d5725790007fdfb33e8fecc97d329d91235cca6cf7447ffd4875db9e7efd19a2590dc33a4e1479e18ff0b27f16a7234d8fd7987f0c0b51f5634c69a6ad274a274961e295ceab6bf493572c0879607349a34a48ee85b36d8d105393bea7f24facc23dd37c4b455d28e6de0e53374f39b0723c88ef4b51eedb07fec1d37a37e4c8726926ac1baadc730f91fc19739306b8c75de8d877358413d1d89f18b93c3c1e42befd63d2b76af362cf4766a9bb073ca9d63bbf6d8e1456a7511692d3c53b8d00266fba0754ea3882d937228cd9898094815b5badd10db051d3d6569ea03d465cd096232f5180887c98a1c4aaa8b88bdaf8c3b419026073bdad8e56103d38560b2f5bfbbd95393c0fea8da34be8b95f91ffaec90f96b06b5e5a7385f1022c46957138705485e0511897455b5dbbf972ce245ec6ec41a13fd5a5b603b209699b202b30efe205b17d7853ea5d2fac082b63ef47774d1d0ef244f3aae69557f4fbcf99c00c9c436b219b7b3a9af5a4c3e011de803a73296c56f8be6d9e42c12039a9bf0e27ed52e9cf9974494617bf3bddaa08b684abb85f52e15f83383bfe9db536e9cd297bce5d4223f6cf4c0bdcb1b72e1816fbe51410974a1f9921f4ca1ea76f500d3686e008f7412ddba6fd96dc365da1f76c9a21e47a2a945d2f531338ef9e60d24fa6723ea62b67a4afe3eb982a431db035932c96a70603a3b78c0aa831c1e2a3b9bbe7591d4558b0e901c36a550639a027ffa114d3c33f06e0f9c4a3a19dd091c1f52e0f8c805ba94263a0ea0cff3044b2c02b550fd557dd3e2bb7afea52d06128c2ade2d543738487db88e0480f37099cf3f87262e5bc45201914addd9dcb7f47e71cd03d8221cd182932e918588a06c7411c40a3976709a9981f572cfdd518de4eed0afc47bb2d7435661ea011323e0a233f584d1bf31ae67d51d6753f8cae752007ace2ba1d67fc98af48310f7fc852dcd95b7d95b7b5674e5b8983f4f1845241323cf7755862d0713e7a80d3f83f588865cb10e6030155eed26f5e9f744e131766a4f41c16bdc0b269cc003d773949852a96107eca805ddc2ff9dad9408182ed0e2ff9764d7a5d62834752080da21137d04e006e6bfb94ae3d507a8b75f3b77cd9d9a7ad0a5193ca73554832e92c4fa2f2ee615056b237e2a0f736ed9553740450b3c1a8772c87d6d4338ad326847a2b23119082d1d9a4b513eeeb776b22b7323d34724d736f9108c2744fdd3c948eeea7882e97f5b7ce1a55897e99910a6b4d317d694aecc26765819215414cabf51fe02cd0920dbeef8daef13edb4212100fe4bcc0a0f6504a92758d4a647703eb923f09f1e654f3fd449dab07dadf8c64a6480ae6e8d052bb0c023b9b52752c077bad9935a5d2f6b591a168144fe2102cab723554853f4929051aa0096755f8f9cb66b986439f5ee9cf402ef2ea0a90b507e27cba174e168c3a9de717f2f03c6696fd957a190f7f7f17812aa6a21544290140c78f3e4a12e92b8a73ae1c72d28de96143f44c0a29b4a70362e3b90528d2b1d19909c8f4f6a6138acb4a449dcaf6a0aaf7b9d55c2ea8828f16056d86d04061744066f933badb681f68e52527832268570107a154645965bc7402107f0e89acee24088a41381b7f045288beee43da96924142c1181aee1f057be4f5b2656e92f2c5605426959a687df70065d4df06188257928ce626696f30432b15d3ceeb08727c8c13a36d1d302db60391e196dd80e6eba25df289faca632f39706b536af486a9e0e0d3473c1bb04179567dec435bf3cf4157a025c68aeb9fef9605db290178597393bb8be79917812e72b25d7d8e53500271ccb554e7b411ec1977528da8d3f50ac27bdff0ad92020e9ee16ddc8ecc51bd823faff1cb9ae903126a95e9f48e55601af9dadc2e7303a05ae25ebe0d47f207d44952d2d61d65a48ac620a7f4d0a46e075fb9913bd9d11e130f981810af84aed2f4c86918b899e45b18df0ffc320ebe0202f82edcbb04a6fb4cbeb17c9b4f846f4c892abc663b401e0262582b4a63f9c9ed9ff1c252804f0b8a3c9091b49348322dcb4aae47596e6b989c11435d049515ec872f3bd3802067aa52bd9280a11481cb618772b9ac4f949c4cd41efe50268f2069ef7c5c7870761c60635b11673beeafb2d4db1cef2cbb689dfc3818b46047a7fab83c0835f45699e17d581b6a3fc897b8d085441f5bfe0f2703b5994a48e2d487c157134f6461358ede3b3209aaedb921719205b651e0bf0e094eb420e6fcdb68b51c6b9440690b545150be04a8ff69d39a1c4d75edbafb9756907a020955ead59d70cd3558a4c73cb7a59a4abd6d86cec112667083235728a968d82eb2f8e5edf3f38c56a6672d96b86140364ac82bc7af324f9ebdbc242f709305a5188965f2aca587b08fdde90902f323044955f8862270d867fdc5ebca9e14d21b9c7bfd09336a073c7e85fecaf4684454b5f97a45ecebafe5909f76240fabb6992b55c9e6d08bd5325b3dd866d3766031114eaa0e88f4f8317e22eb8b03561071bb62843a2b42d21d54f19a7ea68e8fab41566e0159f88f334bd82584e9efd4a78de335b4e90e3b47b13d94dca7eaa13ba84b6ccf4224765ccfdfb4a07354d512fa7e24e54d21e38f0ccfdd026a0d0e0578971291f390bc4b2a46343465d9aa21a8548b417cb19d7bf890186925b9e08c73d60b4fbd4182a94edff744e59b9aa50d394d776c6324651f748133b765ba95b0f298e7a98edc8f7900fd079b46b6a0413492f7e61235eff9a00ad22cb8851d7961ec48d8ba0b3c3b55fe90fdd397911ba90f89b1fc41f67afd6df3db3d9980ee81445611ebf3fb879764feb736670256c8e1991297e056d0ed5e27a09afb4b0877dee4a346c715506d9020922dea59fafeee9bd0db85373cf85f8c1cb7f968a3e92dcee872ac3088fd9dabb2038324b12ddd9d4d3d88af9ae63ae3177a80e9295944bd2792aa8adc4d8a78fb963ad7cac8a54c4b9eace6c2dc40180b84bc01019a3109c06a01003a755dd93a72c17e4d1081daddfbd6a0a1b427a18c7133e9ea300d5bd6b0c0f979f7b71c2ecf04396f485dcca6d090f70a845ec57017953582c66abf0972197655de729a726b86a1829c6b5df405232cf884655e58495b6fafab183d142398139af5476162a6ba9e73644779b995ef53d0f282b636882e44fe9267c0ac187cc529d216075cb35c5c79d46f48599e42aa52b53e1d5ff76ca1ca828090cb5236ae02f50ccebaa63003c46e6a7b9a2af746e33966a313c52233afe385110cb933730d18c2ed90eed385d490e26138efbf2ac677b882040658491e3b63ba78ed13294f011a4a8ede03bc3ef3302548fcd505c8a4b46def5bd75c1674d72e3133d01b09be67437e2bf6776385c46c4c928765f1d4e40457ca2e02c4ab21ebd36d3f1288d73911916118c1cd1fe4e66a11f872370ed46f06cffaac74cc17aff11d2d50d6bf34c22a553a8fb3b7bba7d0ecf1264632d0ec978060ff38a53e5efeb0504d632cb8db28026af3b42afc84eea1af80b3a36e6d1b53333e747ea3f4bb4c4f3e23c8476841d12d3b8e4c19d433d08d9c39bb05dd7d17591d5f12bc18d7362dbbbb4fbcc96416a7ade66d8a66b30142304e0dc739873fc3b975a0b73335a557229ce1ca6486bb563ddcaf7d370d5ebfbe607b1cae1b2a6fb20728f6f44d3ceb36b23b667fb87b08bf020fc486526943f4069d28bad57a190c241de7d36c1002257358d5568bd9a5c24b0500b809b67b1d13593a73fb6784aa609154aceef8d300639f70a607daeeef3092386f196c1cc9f8b3ba508c224a422b11dd1c89049cc4cfb177cff54197c5651a18534e9e03f03d16d73046e6564c29f4b17c11e1ed3b9b940c0b6f58febe0fca800c5ac55102019ade454c6bfc5533b186c335bfab19787acf8d3c1f8c9286d24b4ad55c4349c2829dc78fe706aff1e8fb23464d56e36abc458838f3b8eba9ba60b02dfa531640109e1502bf764758feaa9e9a4b24ed25857f29e041de371dbd2a70c9250938252fa800eca50054d03470295f8a23d990868279517776e996767150929fe73debe058c677251cd33182909fe8890746e9135bd351158ded7a8e99720e6366f55ee9fbf91bae0d55b5c0161d614d398835d646cb62ceed694b52f29d9c9e13a9882c1184ac5013fd1aa45cb15c3c855bdb12fe492e9fde89355b4726095e1a6579841f571bcc9dbe4a3c4849971ea91dbea45a456c4d6dc9d1ee510e1e9947ef008f9853c59d6bc35931a6636989d7e9d93abc6fa6652db96518a7e0d53e31d2184cd9c65d36cbf16e9e724c6802ad2a08f744b81cca76ca67ad90cc1047739d163ba8ed08a9f2e180d8096f607e47c642f8fbc6276da32a724583994039cbd89093f28a7d137042b5c1b1e5cd18533cf07c97f9d219d08e90ea18b409ed166d84a653ff80ba84c60c429f4886b04b928da8a9bcdd1ed2f340cbf943a12ac94554b05ce31324cef39e31b1cf27659603e7294e72a461ebda053307236c10fba9f3427451f5d280f48242474fda77c4d5d4ee9bd9ffb51f25fcef2aaf1a90309bf8f3cdd3c337abf2a71d3ea3461b838dbe4edaab30c19ed8c34ae44200022bcc76f92855bce0f7ce6b369b3ff6e1a9bb7e8125903eb48c9c659190cfcf7653d0ad839b3891e0a748db422520f572030193801cdf07f4f", 0x1000, 0x3, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x2, 0x0, r1, &(0x7f0000000480)="c10d45424c1704951114e382213b2d6ec0918c958eb43345350112eaa09b60715011c8732005215bf9e342", 0x2b, 0x5, 0x0, 0x3, r4}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x6, 0x9, 0xffffffffffffffff, &(0x7f0000002e00)="b5a938ec607fedad3ea3d24e16becb0b8a28ae4209dbb238f2a3b27b4b6cc0e855c66ad8ffa9c2075cbd5d97ccc177b0392e9dfc1b5b0b62db502ff1c9850b89d8f033811e719af54d72ef951251681309f4d16ad00d277ba47e6593e275498d958558f498a6192bdb48b249a4a33116dd437de1a9b21e79005d1f052a19730b242fd0c44d22ee3abdcb9d86079dca412783e8f1fd77c85b2e728ab95a3466d53c088df8389b18e9b2593e8fc4ce88f0027483bf5fc939ec9761ca5a1cac13452744dee0cab49840d80e4ad5fdd27ff83f9fdf78acd6b813d167e5575fb1495874d8489ef2a6b1cf44650f257a3218ff8482da674ede6bcc2b73746e63b270689dc632b8aa01984aee1e51a1f8de87175849add5a9ea882dd5e6740a53411be629e6f93475d9e37cb790c44f84357b627395643b3ed7f3284655c806e42c86a0a4c299a2b5433696fea9221c20fe91cb1d1203df1674bda0c37fa43c844b358430fb6a2aca0e80bb63cec5835082c87affcc4768ae38db4171fba6db59edc8568bdaebfa2e06010737a05870f78ae865b616d8d3ce0cb22a17f9ff1746310f9e2c5be4a02ad95cb605e17fa4a7e76815195d09b0b4ff0aaa6f0d284d0caa82f2a402e29e5b17b14b469b4c1324e2052d52243c431dd48dd1f4612d554a8a87a24b4ef700a9c50fb9e0c1e6351a7069b874827f08cc96b4b449fe4c408e8624ab9aaf62b39841f18f3eb0d3eaee8e737eaedf124abc3f13ad2e71408dce669e18a3eed86208ef1f8a3fc086106ac4922cae9c07ff56d0d2c7bf359e50edaaad3c3863ab71435074961215896169cc3356cb78f1370b7175f271c46e587fe01d467456fe645e0421fb4395cebafb5057bfaddf3d73067d47725f154a11ef116b1e406aa44611713f37fece92729dd19d018428d707553a69dc58669121f60214c156e998f7456801ff9c068e1169af441892fdc6b5ae515400346a746119f074fe9b7251a256cd2be6f32257cdf13ec15f3622e38b507990b2a865a0772d98ee2a5c23e989650c0e4b9c91e834f215ccae263340f57771213e2c6a7b41698045a5c1017ab7a3e57f660e888e100e1677261f1e6ec17cd12e89f0090bf09601d39bc28cbfddff5580ebbb79463d5f4e5fdeb883678438c102f1f12518e6c1b31d0605f73bfaa607a0172cce5a188305aa32bf12caf950ae1ca0098683ed13d935d01cfe319b38a4bb6411c265673606f77690212ba84ee631f7e2b89f21fc163680a6a714b24ce9fafe032364ce466b73dfb3a5a5e21d0499868dc7d5779f237142c41ecb8c4a8bd067867b83b21f87cd32d359c9af6b0208c47f4142135d9e337513fd2890c32e0db7cffaeec5e4e26b74cae2daffda310f9ce19afdb0bab9954c3a211c12925280c85201d6980215fea44035f6b796173726449ca92f6602b4f80a0ad36aced4272620ac0f2228d2965f03cbb22eb7ad8fef7437d59abb91091b2802bcc9d92d1d74243d1c30d39c2f26bfffcfddb28d26754de9ce91c8e6f0aa2daf83104a477be3b3d75b32562b6c918884ff07905abcea16790ee89fa7b045e122c6623b413d5a51dd71727b8757e3b02f49eddb4b51ead5514f34cdd51f9b64698334986e7070b868c809e58e43e51daea66a831fb0b933a1745279f4a7ab425e17e932929aac9c16293e43d2793dbab555d7fdc07e412bf4d302923dce4288d2bd27b38dfe4c5a4dfb3e63b45ee05451702e0d0ba16ccc1a0bddd65000abde6f29eb701a690e6b740c9a8158bb1a751128724cfb2fd92ee423cd9b16d7548dd92c3c209717d42dd3ae13deab1a47f6d0bf82bb23d55c90940e29139dd132d1546d08fce2948311cb04c7d97df03f3e0c8d0c4369e0c6dac4b449c8c1c68b49a98935eac1d8c307361ec1a7949516de6da4fb826b85a84e2e19c4b39cd12e93033ba3ed10c0cb72a48a1dff16cdcf6350e4423469cb2e635cce08734f231a706f0c48435c370d631c8faf822db3d71ecbeebcf69a5f6296d04e8abd029548dc58a84c722336dd878ebaf857242666be0d5867974f33a4331f043d1779a3963ceb518e7bb9248f04915b0a098ab35f63b47b0c0ee484e004fa6ff7549a3505876804bd180709a49031e852484a2fb451845246f00aa1f6d540ebacbef39a8038409d73fe1c62b554b29643546948aaae5788983e295c971570e60bb111202e441e6183b0c8dba5577e5af30b7e119c15ab5448390b7e751d0f7bbf816ec92a605a1f205fc43133c7b05cb65fc66507c040601f4d21e71c60b06584c35b8d9f21b2d773cfa992a5555d5141974afbd4f94531f2517dff3402473f45ae0832f6d11f1abd7051deef6c808ca1a4a375e319404dbfd569d185f631ad579673d8e087a1dc3804717d123af102a5b62a941dccdc6038a72e0d4c569576599f08690888847094a9d5aa8482a4917fc46e5d53c585d92cdacda3fae153c529e0282518c8e7e8137a7f553d48cd045586977f53b32ed388ddc9c13d4505836146f0f57113686d85d98bb63d0dfe7e2f7f383155368e189b347c5e8ea928b5298023abd07d6c7e3b263d75b7e511ae4ac010f27480b54d6e8e5235a8bf635c30430c2af00b3e97c462a319eaea2aa9fd173d883f3c89cc6b1b8e9d6017eb7ef8cd361af3e1ed7c80b765f515f00ec3442fdea28470e1349296a506223a638664df687ccd29674d2dd4e5001100060f18c29e4770035f2c5d265017b8b420c955636b2ebf8ca2763780ad2dd8bb15f254ec2b89b64d2b9c5ea48a1acb4153b6b54187582720087f4d4968fa80f1e0b3766f6dd7cc586cc6a4fe74030ee150ad05cee788cdc3d2cd1c8812db061670024757930043e4b6a3deadd9e1eb0d9758c1571be05cac5b7b45ab14a648cb00fddb856d57b47f6ccf05d40c2fe95c113b96a922ce6d41871d9354590c621f0532bfb334820f85f8788d20ab1d7ab1540902e5f5157add8472657698f6c5d9a8b5a57a72c07b755d8587cf0399ef2ad6d668f1b2bdc17fdafdca887e43f213ae2ed26115e0c94b6986baaa14fc0b85d71975554f0de6a3d164e45b714b5da1955691e3f00491797daf8739535a1d207cc591868cc9a8ca22808b215884df6911d7281bc973efffecc2c35868ca8d882199b5af79cbab68259f6c0836306f2992954dff3d5c516d52fad0ca489dfcc83026617ea164a9eb722937f5dc646f8e6ef252a844caa20e1191a3865a97d137c3c899ba2f7487e5c0efa8502bec1bdd103c0eebec39ac380c942274b961fdde42599de3ee75e039ef0179da7f91b28eee900004067693f21bb4f761f853eeb6e52f13e7d94d4bf66d0bf30c75e86648b5a98f9a6449c9a9b00c4f2e38d63ccb5d0afc9670e4d4e3e3e25e138541a6eea90655a02208f44f97753247e60ded1ac9d7aff60ce65e35c9a5adf720cbe11c3421d98648c48d9bf040f33690190bc0fec69a9e0ee10fcf1042122a533d4548ca79ddce0fcb0532968e9c1abfb99bcae709a45e36bd54dd7b6d79284e7dba9b4c65c89452fe3b8c9cb735120e596ad3aff774b67c0a85b8bb80cfb5cb5a9d03d749e900c611670918d050870d95189058c355bed703574484481150b43253e72a18b4c444e5c2b3821e94326bf72d6f93c67e9643145ab5b75add8b6e3a52dd91b8c90abbbbce4c0093ffeede8e73023bf45fe88dd43a65c0383d0a3cfe695fb92c86a7e81c31029a4cb9cdee61f6fda17701ab7bc0f52425f6b864d580a13cc8398f6aed256340b3e8b76b436f9db7293faf786e8f497b6d2bca8b53482df34d888be4791b6b56ae57c558159a7d35263606cf9cc3a2120e56b78c2d56f3b376a4410d5e89576d54981116c443681b1e326b908cd04be03061161a5db1cd4af9ba6aba3fff08be6436188d245a0391b5c2bb18a138a10df18113a65e6cfb002a41db65ba0d84026843ba2210e87a19c968d075ca6fdc8a89a3f1a90bedfe296880de1e31c603430747a1791b42bb7580dfc82e8fef4ee752ef26ca62da20c004e1c5bbf29581acaf882526286b028303f3366a6f64a740763789dc534e1de1f58e9ca3b330e24bf663bf97a10e362d2752e7b51b7002f1f2429de5b90a3e063aaf63ede427f801b9486a72c5d25fe496651c7edfcd5e53412dc337fdf5fd8c482a44b5ef02826530658dc2df42fe122260706431c412d962a1643a407be333dfb6d16b18656c531f5e85ef62692251bd733ab1f1336d3a4fb3ab96576a31122174d28d988020e35562a8fc284bcb9622a9b076a09d34d163112e3859067737b38f4904dd2ed4924de4b8a4c0692cf9c6c4dfe946cadd95457a6e0d6055304593a637df41d0a1731825bdb063a7b7e6320ddf14db86a47fb18070eff7d6de08db49731a2dcb7beb9f88023524cdaecfb8789742c6774e3c2c7f3ef080c56ed9ccedf4fd7cd66ebf10c7bf96716bdf75a44a4c74a70a75669308b473caf5f56046dc162b9bde238510867408dce779d2ccb845a6023edcb05c96d3d9ac17aff09c5f70d73aae1a5ee6411ca1c570f83980a712d28a2a68439d6e6fc9c149a1b73ea807588162c6ad251b6f529c367984abe0614c2b0d8a9249d8c25a7004a6ea8a4ddd27d755742123071fef06f5225b52d1ed411de2fc8d0f1feefc45553e191ead8d29920cf4e329286944d2d73c9d6eba5ee5c77f41e2e80570e5fbb31da39d07d13d739d37322d56903250c9714f77fe36c3af8cb0d2d42e401b6130f1b1a09cc71e13e34408b6c90e954afb6893ca96621553ced96c6db22f60a11fcdd81093de524f4a7ab780e6a24ed9fbde38429c63be6c5861f7620271cb83709447f683687d3baa4e7cae3582d0b6856b76400e0ba61beac676743751d7e3fca87eb49273383c83ea8c3981bcfb44af9ab3e4d3c9df3ce1ee91966f1d6fefe251edc71d4ac5026c755ea65c0611d7f777c809265e23c88454b8f0c200285dda3db3340ece4574240f43dab34a872ccfe83c50a7ccbdf535a9b64ee63e1ce403816a859687dd43a0472df29ce2ce3e4467607a8f11beeea5e556858d63aabfb60b1b534025774a34d260406df4d34f1d04da16d8b9c371e1d887e5d9ede89c81db93c44a8ccf43cf7006357d2b69672dc7145a511367bc48b5a819e401689bc1321b23139a3f44276027512557efc9ce19939cf07d241c2cdfc031eef403a40a4072de797ba48f0ecb791d20b2d5723b56c754d5984404df29fffc1f2579a6948d46bfb429387296d565fe766c75a491cc60f74bd439b08bc0170b77723dc0b38867a1d8d045b6aba0ff5955068fdace58f6371492f1d077d309675bd0d006cd58bda52051f902ec09653f65cbdd10d7ad096b79b5d08451d56cd9ad8df79fdcbf849bc17f066b10948ff76b87038cdc3d021198691107abe3e59b6165a317e0fca60982e79321b4520a72f4e0ffe1393ab6fbb58c5185d4c61c3802c765d7f5088f28f4ff9019e502fb8e04c8f3ddbedd2e64b18ba9b1405c7f26247a71bea547e6c1e77aa673b12cdfd18229d440d85fa1d682f962bf8509492cc20b52a3e671b69b6d2ef0c2545e0d16c22045cc1659b870153c2a3140e09fa85e3c140564edf7641cf4ab2849e7dfc90bb56f740e2858dc21ca7c074b0343182dd60e957169ddf3d59e24842a4240feaec64b389feccb0304973d9d17a30302cb208aff6f164e79a092cd9b1ef3823ee92b8655714399cbb1c76de4c8627d9d903caed9b855619bdfb2f2536ede0fed96a8d2a63990a45864a1bce75aa1", 0x1000, 0x2, 0x0, 0x1, r1}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x3, 0x2, r8, &(0x7f00000006c0)="d155e0e5cfa5a59573dc885d62ac0b32de80c8c193bec21a7ea7e8bc5d8d102753c8e0d7478c6b32c4ac87e0d5bf1849f4ef3e45f0a27b33fd967ffe456984643bd824f708fc35694a71dee3ff575c91b7a9fcc4d98484888881dbf77a826df7314b1c5d8b22bf", 0x67, 0x7ff, 0x0, 0x1}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x7, 0xba8a, r0, &(0x7f0000000780)="f2186ceff633aa83754afa132d223c0ab83f49f6256e61ee7d3ef15aab0b00073f7636eb96bce67370d881e672301edff7febd453240a6e0a02e3bb7c4f748006760ce17374dd0a8ad7c4938fca260cb62f9af24c3b45bbfb7aeff4e50be65858b9f0f42548c609ff4d84fe7e069901f0a799fa2a74c514050e879afbe71fc3e65e3267984ff105b956f3ade3828d28e6fd7d35ad3bb35a5a3aac46d2aec3030212b497264b92286d8c11956f660a6da6fc8c90368a9bd36be94a24b021df23990f0c20861aad4e42bbba32566c0fad7f3c5ecb8043c04cb83b7071d2687aa97c7", 0xe1, 0x4, 0x0, 0x1, r4}]) io_submit(r5, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) recvmmsg$unix(r3, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) openat(r3, &(0x7f0000000040)='./file0\x00', 0x20082, 0x60) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:21:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x10001, 0x80b00) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f0000000140)={'\x00', 0x1000, 0x3, 0x2}) 10:21:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 24) [ 1660.763873] loop3: detected capacity change from 0 to 135266304 [ 1660.774139] FAULT_INJECTION: forcing a failure. [ 1660.774139] name failslab, interval 1, probability 0, space 0, times 0 [ 1660.775955] CPU: 0 PID: 8761 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1660.776871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1660.781980] Call Trace: [ 1660.782327] dump_stack+0x107/0x167 [ 1660.782858] should_fail.cold+0x5/0xa [ 1660.783423] ? create_object.isra.0+0x3a/0xa20 [ 1660.784061] should_failslab+0x5/0x20 [ 1660.784599] kmem_cache_alloc+0x5b/0x310 [ 1660.785125] create_object.isra.0+0x3a/0xa20 [ 1660.785732] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1660.786421] kmem_cache_alloc+0x159/0x310 [ 1660.786980] security_inode_alloc+0x34/0x160 [ 1660.787601] inode_init_always+0xa4e/0xd10 [ 1660.788143] ? proc_free_inode+0x20/0x20 [ 1660.788669] alloc_inode+0x84/0x240 [ 1660.789136] new_inode+0x23/0x250 [ 1660.789627] proc_pid_make_inode+0x22/0x220 [ 1660.790208] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1660.790975] proc_pid_make_base_inode.constprop.0+0x25/0x180 [ 1660.791714] proc_pid_instantiate+0x50/0x1e0 [ 1660.792305] proc_fill_cache+0x373/0x4a0 [ 1660.792831] ? proc_pid_make_base_inode.constprop.0+0x180/0x180 [ 1660.793706] ? pid_update_inode+0xa0/0xa0 [ 1660.794302] ? pointer+0xa80/0xa80 [ 1660.794323] ? snprintf+0xbb/0x100 [ 1660.794352] proc_pid_readdir+0x3d3/0x830 [ 1660.794371] ? proc_pid_lookup+0x460/0x460 [ 1660.794384] ? inode_security+0x107/0x140 [ 1660.794405] proc_root_readdir+0xa0/0xd0 [ 1660.794420] iterate_dir+0x584/0x710 [ 1660.794438] __x64_sys_getdents64+0x13a/0x2c0 [ 1660.794453] ? __ia32_sys_getdents+0x2c0/0x2c0 [ 1660.794463] ? fput_many+0x2f/0x1a0 10:21:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = epoll_create(0x5) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f0000001e00)={{r1}, "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"}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) [ 1660.794475] ? fillonedir+0x4b0/0x4b0 [ 1660.794495] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1660.794510] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1660.794526] do_syscall_64+0x33/0x40 10:21:27 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1660.794539] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1660.794548] RIP: 0033:0x7faf66c84b19 [ 1660.794561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 10:21:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r1, r0, 0x0) openat(r1, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) getsockopt$inet_int(r1, 0x0, 0x13, &(0x7f0000000040), &(0x7f0000000140)=0x4) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1660.794568] RSP: 002b:00007faf641fa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1660.794583] RAX: ffffffffffffffda RBX: 00007faf66d97f60 RCX: 00007faf66c84b19 [ 1660.794591] RDX: 0000000000001000 RSI: 0000000020000880 RDI: 0000000000000005 [ 1660.794598] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1660.794606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1660.794613] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1660.932280] loop3: detected capacity change from 0 to 135266304 10:21:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000140)=0xc) mkdir(&(0x7f0000000380)='./file0\x00', 0x4) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/cgroups\x00', 0x0, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000340), 0x4) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x8) r5 = signalfd(r0, &(0x7f0000000240)={[0x13b3]}, 0x8) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x7, 0x8, 0x8, 0x1, 0x0, 0x9, 0x104, 0x10, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000180)}, 0x4, 0x6, 0x10000, 0x8, 0x4, 0xfffffff7, 0x401, 0x0, 0x9, 0x0, 0x80000000}, 0x0, 0x0, r5, 0x3) 10:21:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x0, 0x5, &(0x7f0000000600)=[{&(0x7f0000000240)="59a7491d6df2941ee8c1c56956dced1874002b4e7e98b41303585cf4a276f17be31df4a6b9c9dc2759d73c97a956cf275384e5cde9d0ca7acd9a658d95ed169b97fcc6253b2a4bf6463d1183947ec3944760abe6aae29ca52840c7164219c385ea21ee5e", 0x64, 0xe25}, {&(0x7f0000000440)="39997f7310d98ea14da35d0b807a4ed5b8104dbf7ebcf1ccad126df687fa1ec79485cce55ffed60fda224d26cfa902f882cd6bd2d3a76539ab4e6fe314ebb4833cfc3260bb6dd9a1e49df2ace9860f1277d7bff2d8ae34a33b4cee04ba95dded4b0a85523361", 0x66, 0x9}, {0xffffffffffffffff, 0x0, 0x3}, {&(0x7f00000004c0)="3ac41686c3746b376b98", 0xa, 0x9f0b}, {&(0x7f0000000500)="37c7ec436914ca3f9210f4de732723dfe75a1ab15a91f0f74b5bf3afefe12ea47c09d688f73255ecd4f851aa3f265e9dc1fd1cf2d51b8f4fb5d0fbd997d6901d21c52b53e17a1c8b5123f5f9be14cdc5bf08aae993914a41219adc6f3c3a9e190e417afb017e88c729e553c9ec77ccd4f14afb84a020b477a487267b11f98eb2f92321a16319992e0bc570885ce5664a1c3de9211e4d85a7e6e91365a1a65af40aaa26816302dc2f0939a6b17db002006b1217b4cee901fb246f7d28dc38ccf61aa71bf8500ed5a907ac0aac110b93e007561b6f8306c587192b818ff7f410f003", 0xe1, 0x3}], 0x800004, &(0x7f0000000680)={[{@rodir}, {@shortname_mixed}, {@nonumtail}, {@shortname_lower}, {@shortname_lower}], [{@uid_gt}, {@obj_user={'obj_user', 0x3d, '}&\''}}, {@permit_directio}]}) r1 = openat(r0, &(0x7f0000000700)='./file0/file0\x00', 0x4ce2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000300)=ANY=[@ANYRESDEC=r1, @ANYRESDEC, @ANYBLOB="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"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000580)) r2 = syz_open_dev$rtc(&(0x7f00000005c0), 0x9ab, 0x20040) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000600)={r2, 0x8ed6, 0x5, 0xd657}) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x40000000000, 0x6, &(0x7f0000000440)=[{&(0x7f0000000180)="ddd5f6d81542d295fd6ae10acc8d27fa11c7fde9241a194a9ffa39433b3494ae1995a45d775f88cb3ed46baa3b9d47e6057844952f9b6d1e452091b40216bdfac2f57b01e74788fdf1a413", 0x4b, 0x9}, {&(0x7f0000000200)="fcac59935ac2fcc6915d5b8c4a5389a090b27030ddf25f147a40c100972b51c53e9a52ef04ef8760ea17328c6eccff6c1585155eba909b257f65453d4e5c57929b41c31a1c3342476cd427e153a146d3425ee5ddc05f3363b950c80d6e6144125db95df026d34eab23dd601c0ec4e234917ccc7738eb38c4b123997c3d077c99", 0x80}, {&(0x7f0000000280)="e26434115d6d8215a1143c75f5a485", 0xf, 0x7a3b5ef5}, {&(0x7f00000002c0)="4352d8d1d01eb588d36754065b8217404415334257eb06122b0e5c50537ea582a7a9096d77e2169dc532711386461aabf09236e8a5efed2ff1a602fc80bbea5c680f2e58ea76f19f76a7de2734c2d87c631ac763ac671a3c9afe7b362031579aa5a3c5", 0x63, 0x2}, {&(0x7f0000000340)="a8360e23b8da13465531ea97f757b082381d9010a9a45672d28f4ce2ac4aeab508596d5e163e2708ac49a5f486cc6e1fba0844cef6bb79babc11d41d83b61537063d5168e4612285bd6a9177b66ad1d0cd0de7af7602bdc4c4c5673acbba43703c75719cbedc3e10b8c0afe73aca93c9f13d5df7c90df90597e2a162ba934201d7f22429a71c537c1adf1b7f701a581c01a23b313e720ed29e2c6090f81ebeb8fea3f5ec8fb2cea5c15b778d", 0xac, 0x4}, {&(0x7f0000000400)="f8b0255cfc9b5638d8836eb1aaeb5134f22262f27c623492c0", 0x19, 0x7fffffff}], 0x800000, &(0x7f0000000500)={[{@nonumtail}, {@shortname_win95}, {@iocharset={'iocharset', 0x3d, 'cp949'}}], [{@seclabel}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@audit}]}) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) (fail_nth: 25) 10:21:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4086, 0xff6) 10:21:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/125, 0x7d) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x4, 0x6, &(0x7f0000000500)=[{&(0x7f0000000200)="ef1c2071b9466485b38bc8f91ac9db8a907b2582678edf78a49d62c9df0c905198cf76bee90c30026861e8b164e9bd8e4fb905fc2fbf211590fd32767feb3299d61bbcdcdc128e04a1a13b9e3f15782333a326c82a22a6d1c7e058a011fbffa6798fbe2bf375a1416da445f22aef35164ebef2fc8baaaf9395ca1d3aea451409ad689ad0719d92cf07cdf76aeb4a194c80616b32fe3d5b7db4d683e46a7d9b3e69017a5d05797063c3b594f24431e29861d0f5961ecdc66728184009560cebc801480f484217b8ff40de420fcfb825457faee187cc7c06b17e12c051b439faa70709a0626b9cf0c66639a4e8ccd14f12", 0xf0}, {&(0x7f0000000300)="8f6e4714e98dd8fac6a08e4647f46f5b156edb15f099398962fd", 0x1a, 0x4}, {&(0x7f0000000340)="95a9ea90a77dff7efa50a7dc3cd53b18ca1e6a833879d7c5d6e3f832a8fae3a9054d999ef091dca7e85b4dc1a38fcd43b13bed693de770373538f0e7e632b5", 0x3f, 0x5}, {&(0x7f0000000380)="66a02dd8e906c342b1756df2f6c87614032d1fb1364d070315f972725d0705b927eb14be4942a170d46ebf8f321dd9208a0571433ac23609b39ec2816a9598b1cdc0acf783f5de8316afd3da81289558368eeebe80494f1086b842d50ce8bb1f232c5b9e74a4a397f36a2e8f5d867f396eab5584792923271097e658947bdae216dfadb4c82044529f64586c579e3d69b81e0df1066ffe010d17269812bdb0fe1634aa24f4f00adb364101d5ba02eb00420aa98e1faf15ec848a79831ee99dfb0b97d10ed335e880ba1d8ae4248fba0bf956a78365d2a913a0b0590299d2c36021e3a0d30db35f5cdb935c9026af5440c4b87e7d90f27507667e04", 0xfb, 0x3}, {&(0x7f0000000480), 0x0, 0xae7}, {&(0x7f00000004c0)="c7a7b715768b239466c97f68e0143f4dff87190ee379eb09be66506f65feabd65b1b9654722ce7447e6a57326d07e43e7b64b6af3c46e14d55c9c7d8ab", 0x3d, 0x2c}], 0x20000, &(0x7f00000005c0)={[{@utf8}], [{@smackfshat={'smackfshat', 0x3d, '+},'}}, {@obj_type={'obj_type', 0x3d, '9p\x00'}}, {@seclabel}, {@hash}, {@fowner_lt}, {@uid_gt={'uid>', 0xee00}}, {@smackfsroot={'smackfsroot', 0x3d, 'proc\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x34, 0x31, 0x38, 0x39, 0x61, 0x62], 0x2d, [0x31, 0x35, 0x63, 0x62], 0x2d, [0x62, 0x61, 0x32, 0x66], 0x2d, [0x38, 0x64, 0x65, 0x36], 0x2d, [0x64, 0x34, 0x30, 0x64, 0x33, 0x38, 0x31, 0x62]}}}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) mkdirat(r1, &(0x7f0000000480)='./file0\x00', 0x9) renameat(r0, &(0x7f0000000680)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2580afcde94498f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) [ 1674.858570] loop7: detected capacity change from 0 to 81408 [ 1674.863342] loop3: detected capacity change from 0 to 135266304 [ 1674.871721] FAT-fs (loop7): Unrecognized mount option "nnonumtail=1" or missing value [ 1674.872193] FAULT_INJECTION: forcing a failure. [ 1674.872193] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1674.874674] CPU: 1 PID: 8809 Comm: syz-executor.0 Not tainted 5.10.238 #1 [ 1674.875599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1674.881984] Call Trace: [ 1674.882334] dump_stack+0x107/0x167 [ 1674.882826] should_fail.cold+0x5/0xa [ 1674.883337] _copy_to_user+0x2e/0x180 [ 1674.883834] simple_read_from_buffer+0xcc/0x160 [ 1674.884483] proc_fail_nth_read+0x198/0x230 [ 1674.885045] ? proc_sessionid_read+0x230/0x230 [ 1674.885634] ? security_file_permission+0xb1/0xe0 [ 1674.886305] ? proc_sessionid_read+0x230/0x230 [ 1674.886907] vfs_read+0x228/0x620 [ 1674.887392] ksys_read+0x12d/0x260 [ 1674.887850] ? vfs_write+0xb10/0xb10 [ 1674.888339] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1674.889045] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1674.889713] do_syscall_64+0x33/0x40 [ 1674.890246] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1674.890906] RIP: 0033:0x7faf66c3769c 10:21:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) open(&(0x7f0000000040)='./file0\x00', 0x101400, 0x40) [ 1674.891388] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1674.899612] RSP: 002b:00007faf641fa170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1674.900657] RAX: ffffffffffffffda RBX: 00000000000007c8 RCX: 00007faf66c3769c [ 1674.901640] RDX: 000000000000000f RSI: 00007faf641fa1e0 RDI: 0000000000000006 [ 1674.902624] RBP: 00007faf641fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1674.903602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1674.904581] R13: 00007ffd3af399af R14: 00007faf641fa300 R15: 0000000000022000 [ 1674.909685] loop2: detected capacity change from 0 to 5120 [ 1674.926703] loop4: detected capacity change from 0 to 135266304 [ 1674.966475] FAT-fs (loop4): Unrecognized mount option "nnonumtail=1" or missing value 10:21:41 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0xfffffffd, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) connect$inet(r3, &(0x7f0000000400)={0x2, 0x4e22, @remote}, 0x10) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r5 = pidfd_getfd(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000140)={0x3, 0x80, 0x32, 0x3f, 0x0, 0x5, 0x0, 0x7, 0x2002, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x200, 0x7}, 0x1080, 0x7f, 0x2, 0x4, 0x2, 0x20, 0x9, 0x0, 0x9, 0x0, 0x3}) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x20002) pwritev(r6, &(0x7f0000000380)=[{&(0x7f0000001e00)="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", 0x1000}, {&(0x7f00000001c0)="326f67b0824a5c9fea0e09b25c0dce2aa34289edc5b2106ff76e33235b98ef1a449d9066a937d75d6ab5d90c4d0f39c809bc6ec086c71c1eb29b36ed6be6ea6c3124324aa3a631af36309aa088917967b37a56eec78ec0b313a73601d9da3d15ac9d04b900b74dd83534e9cb7d31d2ab31ff59e26b28ec9efe8f3dcd46c046b060862ee5", 0x84}, {&(0x7f0000000280)="125d834fc66c7be939014690d9b806b8517ec29438b084a935e7057de7325baa569aaf09f3b425ee8c1c9f862116cb62bd9bc0039b8ad16222aa312c18db8c163abff83e51960c2f0e9638d95791294f7dde641ce4aec80a89e8b9766799947548fd0e69ee", 0x65}, {&(0x7f0000002e00)="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", 0x1000}, {&(0x7f0000000300)="afd4d92da09fbeee0f96b2cf01bd26124d5ad85dde60a62c91e87a2d", 0x1c}, {&(0x7f0000000340)="88844a9866613bd9a29ede3c", 0xc}], 0x6, 0x20, 0x0) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x200000, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000740)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffff7fffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) preadv2(r2, &(0x7f0000000480)=[{&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000100)=""/205, 0xcd}, {&(0x7f0000000200)=""/163, 0xa3}, {&(0x7f00000002c0)=""/105, 0x69}, {&(0x7f0000000340)=""/154, 0x9a}, {&(0x7f0000000400)=""/109, 0x6d}], 0x6, 0x3, 0x5, 0x4) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$VFAT_IOCTL_READDIR_SHORT(r1, 0x82307202, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0x80000001}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1675.077596] loop3: detected capacity change from 0 to 135266304 10:21:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x5, 0x0, 0x82, 0x81, 0x0, 0x401, 0x400, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x54020, 0x0, 0xfff, 0x7, 0x7ff, 0x6, 0x4, 0x0, 0xf7, 0x0, 0x8}, 0x0, 0x7, r0, 0xa) 10:21:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=@sg0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='incremental-fs\x00', 0x40010, &(0x7f0000000200)='proc\x00') setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0xb51c0a, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x236843, 0x158) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r3, &(0x7f0000000100)=0xfffffffffffff674, r4, 0x0, 0x0, 0x0) openat(r3, &(0x7f0000000240)='./file0\x00', 0x20801, 0xc) r5 = pidfd_getfd(r1, r0, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r5, 0x8008f513, &(0x7f0000000040)) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r6, &(0x7f0000000100)=0xfffffffffffff674, r7, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r7, 0x6611) 10:21:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x2010, r0, 0x8000000) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd, 0x8, 0x0, 0xfff, 0x4}, 0x5) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000140)='proc\x00', 0x0, r2) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:21:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = creat(&(0x7f0000000040)='.\x00', 0xb9) getdents64(r1, &(0x7f0000000200)=""/4120, 0x105a) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000140)={&(0x7f0000001240)=""/168, 0xa8}) 10:21:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x18) 10:21:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1002) 10:21:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7f, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x311800, 0x24) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:21:56 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x103) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:56 executing program 6: r0 = fsmount(0xffffffffffffffff, 0x0, 0x88) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, r1, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) splice(r0, &(0x7f0000000380)=0x9, r2, &(0x7f00000003c0)=0x1, 0x5, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0xfffffffe, {{0x2, 0x4e24, @remote}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3f}}}}, 0x108) mount(&(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='selinuxfs\x00', 0x100010, &(0x7f0000000340)='\x00') openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r4 = perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x5408, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x3) unlink(&(0x7f0000000180)='./file0\x00') r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r5, r4, 0x0) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000040)=""/12, 0xc}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x2, 0x1f, 0xfffffffd) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) pipe(&(0x7f0000000240)) 10:21:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000140)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x60, 0x1, 0x21a) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:21:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r1, r2, 0x800) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r3, r4, 0x800) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file1\x00', 0x2, 0x2, &(0x7f0000000340)=[{&(0x7f0000000180)="c365bff85cdb6f37acf1b96fbef66977d4c7523cb910d33ee8aa9757169e232005244532a78feefa899aaa483712ebaf5961212ce2855838a0dee1d9fbb44473a4f6fecbc98d3022a77bee1223dc03d707fb8df09890969e4e1f3f0fb8788eb15086e523", 0x64, 0x1}, {&(0x7f0000000200)="da47087cfc35abf1ef6443fbab0416da26ca36504618e3e843b00bf24711b7c9dd8a2a2c6eacafea6ae6d4f058337fcdc8c4abcd9e3331d05ed1842d34e24f7de49fc36d64", 0x45, 0xd34d}], 0x8100c2, &(0x7f0000000380)={[{@huge_advise}, {@huge_never}, {@gid={'gid', 0x3d, 0xee00}}, {@size={'size', 0x3d, [0x35, 0x6b, 0x67, 0x35, 0x30, 0x25, 0x30]}}, {@uid={'uid', 0x3d, r3}}, {@huge_advise}, {@mode={'mode', 0x3d, 0x4bf7}}, {@huge_always}, {@nr_blocks={'nr_blocks', 0x3d, [0x2d, 0x67, 0x5d, 0x25, 0x34, 0x25, 0x39]}}, {@huge_never}, {@gid={'gid', 0x3d, r2}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@permit_directio}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) 10:21:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',mskEND,\x00\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1689.930140] loop3: detected capacity change from 0 to 135266304 10:21:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1003) [ 1689.962221] loop5: detected capacity change from 0 to 108032 [ 1689.965869] tmpfs: Unsupported parameter 'huge' 10:21:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000140), &(0x7f0000000200)='system_u:object_r:file_context_t:s0\x00', 0x24, 0x1) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:21:56 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x3db882, 0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x1000005, 0x0, 0x0, 0xfffffffffffffffe, 0x7f}, 0x0, 0x2, 0xffffffffffffffff, 0x8) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x184) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='trusted.syz\x00') 10:21:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r2, 0x0, r1, 0x2) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0xa6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) r5 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r6}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x1024}, 0x0, {0x0, r6}}, 0x3) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x1, 0x1, 0x1, 0xff, 0x0, 0xb95a, 0x14c3, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x7fff, 0x3}, 0x40000, 0x9, 0x8, 0x0, 0x8, 0xffff, 0x1, 0x0, 0x2, 0x0, 0xfff}, r2, 0x2, 0xffffffffffffffff, 0x7) write$binfmt_script(r3, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'proc\x00'}, {0x20, 'proc\x00'}], 0xa, "a3584a88c3dbc8ccdad1978cca90ef982d16a3a05dfae0517d"}, 0x30) [ 1690.067078] audit: type=1400 audit(1750242116.864:50): avc: denied { relabelto } for pid=8910 comm="syz-executor.7" name="RAW" dev="sockfs" ino=34872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_context_t:s0 tclass=rawip_socket permissive=1 10:21:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='autofs\x00', 0x2869, &(0x7f00000001c0)='\x00') getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1690.110611] loop3: detected capacity change from 0 to 135266304 10:21:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x6}}, './file0\x00'}) getdents64(r3, &(0x7f0000001e00)=""/4095, 0xfff) 10:21:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:21:56 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) io_uring_setup(0x33f8, &(0x7f0000000140)={0x0, 0x83c, 0x4, 0x0, 0x38d, 0x0, r1}) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000100ffff00871800000024cd1c76a070ab4e2e4cb116b0a4e250e326e3124278c6cfbc3e32807110deaaaaee8d1b29af7c2449096907", @ANYRES32=r0, @ANYBLOB="03000000000000001dae30"]) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x1, 0x0, 0xfe, 0x0, 0x0, 0x62, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, 0xffffffffffffffff, 0x0) openat(r3, &(0x7f0000000200)='./file0\x00', 0x189000, 0x10) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r5 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r6, r5, 0x0) openat(r6, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, &(0x7f00000001c0)=0x830, 0x4) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x2, 0x9, 0x3ff, 0xffffffffffffffff}) 10:22:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1004) 10:22:10 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0xddf, &(0x7f0000000140)={0x0, 0xa0e7, 0x4, 0x1, 0x1be, 0x0, r0}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f00000001c0)) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000a, 0x80010, r0, 0x10000000) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r4 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) io_uring_enter(r3, 0x1522, 0x922c, 0x1, &(0x7f0000000280)={[0x400]}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_READ_FIXED={0x4, 0x3, 0x4000, @fd=r3, 0xfb6, 0x80000000, 0x7, 0x1, 0x0, {0x0, r5}}, 0x34) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r6, &(0x7f0000000880)=""/4096, 0x1000) 10:22:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180), 0x2, 0x3) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in6=@initdev}}, {{}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$SG_IO(r5, 0x2285, &(0x7f00000006c0)={0x53, 0xfffffffffffffffe, 0x5e, 0x7, @buffer={0x0, 0xe2, &(0x7f0000000440)=""/226}, &(0x7f0000000540)="18171eca4574f16010d5306e4f3e120bc55efd59b14316da64e566f848b0c200850275b594932fa1cd0ac26957d7b1e88cb69795932c208f2f237c6b8b21f16c85d5198de5f71e1664deee78c53d3cb1280fc4f5260783a456213082916c", &(0x7f00000005c0)=""/171, 0x6, 0x1002a, 0xffffffffffffffff, &(0x7f0000000680)}) 10:22:10 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) openat(r0, &(0x7f0000000040)='./file0\x00', 0x4000, 0x2) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x80101, 0x0) mkdirat(r2, &(0x7f0000000180)='./file0\x00', 0x7) 10:22:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0xb}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0xfff, 0x0, 0x0, 0x0, 0x400000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r3, 0x0, r2, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0xc0602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x6f0, 0x7c0f}, 0x140a4, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x3, 0x0, 0x2}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r5, r6, 0x800) ioctl$int_in(r2, 0x5452, &(0x7f00000002c0)=0x7ff) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x400, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c63616368657461673d3970002c76657273696f6e3d3970323030302c61707072616973652c6f626a5f726f6c653d2c7065726d69745f646972656374696f2c686173682c666f776e65723de33ef88addd228ac0d3c7fb297098e9731fb328d50924b1f9b166bccb8dea88b3a034d9ed64bf192b939e3e472e88d1b9dcf34341dec3cba1094c5e115a2355cd160c3ed754cac7053c986ba0b655f4011025ebc123198506c6fa7be0eb7768653551a9f8176d9d7ff7d7536906d78f028ebb713af542b7105e39f3edcfb733616041be77e878fd46fd340", @ANYRESDEC=r5, @ANYBLOB="2c1109cc9a742c00"]) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) openat(r0, &(0x7f0000000300)='./file1\x00', 0x800, 0x11) getpgrp(0x0) 10:22:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001e0001000000000000000400fe8800000000000000000000000000010000000000000000ac14140969030cbadd65cdf4a275c20e1d87bb000000000000000000000000000000000000000008000c0000000000"], 0x48}}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r2, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x300000a, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x1, 0x2000, @fd_index=0x9, 0xffff, 0x0, 0x0, 0x4, 0x1, {0x1}}, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:22:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0x1b}, @multicast1, @rand_addr=0x64010102}, 0xc) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1703.966889] loop3: detected capacity change from 0 to 135266304 [ 1703.976515] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1704.001200] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:22:10 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1704.031147] 9pnet: p9_fd_create_unix (8963): problem connecting socket: ./file0: -111 [ 1704.064867] 9pnet: p9_fd_create_unix (8970): problem connecting socket: ./file0: -111 [ 1704.079471] loop3: detected capacity change from 0 to 135266304 10:22:24 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000140)=""/4109, 0x100d) 10:22:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x64010101}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:22:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:24 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000016c0)={0xfffffffd, {{0x2, 0x4e23, @local}}, {{0x2, 0x2000, @dev={0xac, 0x14, 0x14, 0x2d}}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) recvmmsg$unix(r4, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) getdents(r3, &(0x7f0000000340)=""/156, 0x9c) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x1cf) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0xae, 0x7, 0x8a, 0x4, 0x0, 0x8c, 0x8000, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x7, 0x3}, 0x40038, 0x8, 0x0, 0x2, 0x9, 0xfffeffff, 0x1ff, 0x0, 0x3ff, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) 10:22:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1f, 0x9, 0x0, 0x9, 0x0, 0xffffffff, 0xc8a8cfe0210814d5, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x14}, 0x21000, 0x42, 0x9, 0x4, 0x4, 0x3f, 0xd5, 0x0, 0x6, 0x0, 0x101}, 0x0, 0xe, r0, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x8800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x10844, 0x5, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x50a50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x8300, 0x5, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000000000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) syz_io_uring_setup(0x183, &(0x7f0000000200)={0x0, 0x648d, 0x0, 0x3, 0x1a8, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r4, &(0x7f0000000100)=0xfffffffffffff674, r5, 0x0, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000280)=@IORING_OP_SPLICE={0x1e, 0x2, 0x0, @fd=r2, 0x1, {0x0, r1}, 0x400, 0x5, 0x1, {0x0, 0x0, r4}}, 0x100) 10:22:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1007) [ 1717.812227] loop3: detected capacity change from 0 to 135266304 10:22:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x5, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:22:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@remote, @empty, @local}, 0xc) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x81, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="78674056db6910537e7e1a4bed415c7012a025680cb383cfb857f68a47efc501d8a26a95eb4ecd861bb029c4faf1b7a517ce1b67ea6a11ad9c7286d79fea519ee4adebbf881586c57c47017cb991ce3faccb5bbe4f99bcdd97a7b202f12959943c7bb3e6bb", 0x65, 0x5}, {&(0x7f0000000340)="30b4bdd71c4f06cbfa7d37e8342a5ab27d00d31fb44d3c0f0d4831e58aa2819b3bbf8317f0373184cf314de30781d5d848acfada3e2b8b7c5fcae1672f9ddd8771db6034a70aa71650223e643e67eeb7698cfaf62f2222a3eea271a91d83666d899fc499e70c23ad57d279241beebefd87e2521ce4f3eca011f6853d30bf658ffee49e2c4848579adcdbe2bd7522f726041feb7d3ccaa38d5df9eaedae435f02aba44340d2096d2b6a357df73dfd14b790db354850e9056e3dcc1ca9c9ef4dd3f9fc5daef80144b5d91ae805", 0xcc, 0xfffffffffffffc81}, {&(0x7f0000000240)="9c4a2c566fc6b490511c13dcb2afb9dd590fc728928bda455a2dfca8a9a49232", 0x20, 0x3}], 0x2, &(0x7f00000004c0)={[{@fat=@dos1xfloppy}, {@nodots}, {@nodots}], [{@subj_user={'subj_user', 0x3d, 'proc\x00'}}]}) openat(r2, &(0x7f0000000500)='./file0\x00', 0x40, 0x25) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1717.951830] loop3: detected capacity change from 0 to 135266304 10:22:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x8c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x40062, 0x5, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:22:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsu(&(0x7f0000000040), 0x2, 0x290000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r1, r2, 0x800) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x1be, 0x6, &(0x7f0000000580)=[{&(0x7f0000000240)="0a4e86924526407ac8d39aeba39537852909656e2cfdb0143f34351220e405bd3ee11d1323e12fa0540acf9be2b1574b038eb893d24a7b240a62ea32472643f9d031434f74ee8124d8b020eb7c677ec29a5e3424119a5278cfa373c6cd9a875ef7a24df40b6175d4bcd5e919668f5b21c24a74f02c2733bea266db224e5e2fb32678fbd39a16c5e6135ae664926ed5e6df070237d12134e6ddc3fd2cf7c3a2a2a55dac1db5ff565069190a655a74f33d15f51c5e687d10217da0dcb827397c300439872e1f25aaacdb2b640dd372a749825002f83a3d400ce55b8086a73b2208165edf630e3eaac534549551bf", 0xed, 0x5}, {&(0x7f0000000340)="ecd2a3195149726b4ca8eb7b58d47f9c47b4ac06aae15a17f8f66fcfdd701a621e0f86eb8c73c2a772acd5a512b0e097ac6fa0ca5054aec47a9901", 0x3b, 0xb4c}, {&(0x7f0000000380)="46d6a5224f021644f3cd8022b0cbecf00d889861f34b1b8e67dbdab45412a072030e68d8ae3be4658d7980f4fc4a4da114cbdf5e7c9780d0a2a7b5ddc0e3b37ca5f2288e79332923262fe5583f687803bd6d070a40632fdd04ef218b290bb104ea951851009d8cea0f8a0c3d09e3c44679b3903dc89a62499fab2c0ec47265c72cbf2fef87a5ae6a26a20f9eb782ebc6176b52bd2e1db43e1723529db51cc7b5ebbe74a33315cb047c79c76ed141", 0xae, 0x80}, {&(0x7f0000000440)="09a88021caa7c3cee7c59eaea01eebbf5f82adbd8f08610be08266a576b55a5065489a10e1c48a17db60c4a3718c23e753e7e7e10089ddf4462f4e6ecad9b64389c33c007164f6c0bb254d1ec4c049e0c501d17932ab1349f038722d72fd986c76c279482ae131677aa6d3ec1562e1566914fa2001f5cfdb740deeb2fe0f3465eecafca67da5118a81d627ecc3643ad561eeb6cb960d6037be4b40d4dae5c536b8dcba012fd46373daedef", 0xab, 0x81}, {&(0x7f0000001e00)="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", 0x1000, 0x1}, {&(0x7f0000000500)="c13dd416fb9c7eef5be8d718ec2c7e3afb3e479c31c973308eeb3d85d76e3f645d099f5034b8bff67ec617081662caddb4dcb48cd9699d64576c22bebade332bddf91075af9525cc87c857334c33da5d56a9d752043c1dde4deb452e", 0x5c, 0xc1a4}], 0x20481, &(0x7f0000000640)={[{@dots}, {@dots}, {@nodots}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r1}}, {@dont_appraise}, {@measure}, {@fowner_gt}]}) 10:22:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1048) 10:22:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) recvmmsg$unix(r0, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @rand_addr=0x64010100}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="6707002ea2259cc53cc0394b37cac1e3d21be58ebaf4d4be41ef4d74d5bdb1ea1f932202e2bd199cc66c21c7dc08b16635677c6d7911995531ef2bc907440370f5d8aab7dcb528770f1e4bc484503b7482e2d4cdfc522a2a218f74ac91ce1e1ee6739df8a839d8e9f0b3ca3136b46a"], 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r3, 0x0, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000140)={r4, r5+60000000}}, 0x200) [ 1718.043655] loop5: detected capacity change from 0 to 8386560 10:22:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1718.063025] FAT-fs (loop5): Unrecognized mount option "subj_user=proc" or missing value [ 1718.069157] loop2: detected capacity change from 0 to 98816 10:22:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x5453, 0x0) ioctl$FIONCLEX(r0, 0x5450) fcntl$setsig(r0, 0xa, 0xc) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1718.121524] loop5: detected capacity change from 0 to 8386560 10:22:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x2b40801, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x3fffffe, 0x0, 0x80000}, 0x0, 0x200000000003, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000040)={@empty, @private, @multicast1}, &(0x7f0000000140)=0xc) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1718.160415] FAT-fs (loop5): Unrecognized mount option "subj_user=proc" or missing value [ 1732.251570] loop3: detected capacity change from 0 to 135266304 10:22:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="674b37cac1e3d21bd5bdb1ea1f932302e2bd199cc66c21090000006635657c07440370f54050000000000000237de02328a77482000000000000000000"], 0x40) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) r6 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) getsockname$unix(r0, &(0x7f0000000340)=@abs, &(0x7f0000000280)=0x6e) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r7}}, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r8, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x104c) 10:22:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 4: setxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)={'U+', 0x4}, 0x16, 0x3) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2c, &(0x7f00000016c0)={0x80, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x40, &(0x7f0000000300)=[r1, r0], 0x2}, 0x40) dup3(r3, r4, 0x80000) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) r6 = fork() fcntl$lock(r5, 0x24, &(0x7f00000001c0)={0x0, 0x2, 0x7, 0x2, r6}) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)=ANY=[@ANYBLOB="0100"/12, @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653000"]) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) renameat2(r2, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x5) 10:22:39 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5042009, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000480)={'mangle\x00', 0x0, [0x1, 0x400, 0x80000001, 0xd7ec, 0x9]}, &(0x7f0000000140)=0x54) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6cbfb285a0c02067b9a899b54ef2760142c365cc00cd12f80c02c63559241fd4b60d47fdabc40dfcffb12ec9ba494d19b1bdf2a76d34d5f35ce8a0bb7be43f9991a58a9afc64e4d56bf272fab73ed80a500ef88579bd882c82e9275153276563daea09329d3bf33895671005f657e72e01099cf5ba0", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000100)=0xfffffffffffff674, 0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) io_submit(r4, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) recvmmsg$unix(r3, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='securityfs\x00', 0x2, &(0x7f00000001c0)='/[\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept(r0, &(0x7f0000000340)=@rc, &(0x7f00000003c0)=0x80) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000400)={0x7ff, {{0x2, 0x4e23, @multicast2}}}, 0x88) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x3, 0x20, 0xf8, 0x0, 0x5ff, 0x92c545c3abf50fdd, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x631, 0x1, @perf_config_ext={0x5, 0x3}, 0x40040, 0x6, 0x80000001, 0x2, 0x6f64, 0x3cf1, 0x7, 0x0, 0x3, 0x0, 0x5}, 0xffffffffffffffff, 0xc, r1, 0x0) 10:22:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1068) [ 1732.399641] loop3: detected capacity change from 0 to 135266304 10:22:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xdd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100004, 0x2}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000140)='-\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)='9p\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)='proc\x00', &(0x7f0000000300)='/!(.][-/\x00', &(0x7f0000000340)='proc\x00', &(0x7f0000000380)='proc\x00']) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000008, 0x100010, r0, 0x8000000) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x2000000, 0x1010, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f0000000480)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x7fffffff, 0x3, &(0x7f0000000400)="25a38d2f8249e83efb600f1a01468ed2be069d15ad8f96111d1f17f0ade362c69c4c79b52fac73effe7db026e9984ba23c71a2ef29fc93c24cdab1295db366bb99943e8505f2b5f19e09364425e95f56b6d67c99963510841f3a3e3ea96104", 0x6, 0x0, 0x1}, 0x8) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) [ 1732.430701] securityfs: Unknown parameter '/[' [ 1732.469199] securityfs: Unknown parameter '/[' 10:22:39 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@private=0xa010101, @empty, 0x1, 0x5, [@remote, @private=0xa010102, @empty, @rand_addr=0x64010100, @loopback]}, 0x24) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1732.546893] loop3: detected capacity change from 0 to 135266304 [ 1732.958451] hpet: Lost 1 RTC interrupts [ 1732.998461] hpet: Lost 1 RTC interrupts 10:22:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) chroot(&(0x7f0000000040)='./file0\x00') openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r2, 0x0, r1, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff84}, 0x5022, 0x5, 0x1, 0x0, 0x100000000000, 0xfffffffd}, r2, 0xffffffffffffffff, r0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1, 0x7, 0xfe, 0x89, 0x0, 0x9, 0x41000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x10000, 0xdb35}, 0x200, 0x7, 0x7, 0x7, 0x3ff, 0x2bd8, 0x0, 0x0, 0x8, 0x0, 0xff}, 0xffffffffffffffff, 0x6, r1, 0x2) 10:22:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x106c) 10:22:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='iso9660\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x290300, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) syz_io_uring_setup(0x7082, &(0x7f0000000140)={0x0, 0x454b, 0x1, 0x0, 0x2c3, 0x0, r0}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f00000001c0)) r3 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="67070000000000000036e24b37cac1e3d21bd5bdb1ea1f932202e2bd199cc66c21c7dc08b16635657c6d7911995531ef2bc907440370f5d8aab7dcb528770f1e4bc484503b7482"], 0x40) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r6, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r7, r5, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(r2, r5, &(0x7f0000000200)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x2004, @fd_index=0x2, 0x8001, 0x3f, 0xca, 0x14, 0x1, {0x3}}, 0x6) 10:22:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB="2c6d61736b45cb672c91"]) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x29a0080, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1746.452314] loop3: detected capacity change from 0 to 135266304 10:22:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1074) 10:22:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/anycast6\x00') setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000140)={0x0, @dev={0xac, 0x14, 0x14, 0x2d}, 0x4e21, 0x1, 'none\x00', 0x2, 0x7, 0x4b}, 0x2c) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r4, r5, 0x800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYRES32=0xee00, @ANYRES32=r5, @ANYBLOB="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"]) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) recvmmsg$unix(r2, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'gretap0\x00', &(0x7f0000000140)={'erspan0\x00', 0x0, 0x7, 0x8, 0x4, 0x9c66, {{0x25, 0x4, 0x1, 0x1, 0x94, 0x65, 0x0, 0x3f, 0x0, 0x0, @rand_addr=0x64010100, @multicast2, {[@noop, @cipso={0x86, 0x48, 0x1, [{0x0, 0x9, "82ea99c2c3b5a7"}, {0x2, 0x8, "8dd60bc1e656"}, {0x5, 0x5, "c305f0"}, {0x2, 0xc, "fb153c6cb48186b7c565"}, {0x2, 0x9, "5c41eb23ba4e0c"}, {0x6, 0x2}, {0x0, 0x4, "f7d4"}, {0x2, 0x6, "04c33f6b"}, {0x5, 0xb, "709b575b94e0084387"}]}, @timestamp_prespec={0x44, 0x34, 0x34, 0x3, 0x4, [{@broadcast, 0x7}, {@private=0xa010101, 0x24000}, {@broadcast, 0x1}, {@local, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1b}, 0x8}, {@local, 0x200}]}, @end]}}}}}) recvmmsg$unix(r1, &(0x7f0000004100)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000340)=""/116, 0x74}], 0x1, &(0x7f0000001880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000840)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001940)=@abs, 0x6e, &(0x7f0000001a00)=[{&(0x7f00000019c0)=""/14, 0xe}], 0x1, &(0x7f0000001a40)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000001a80), 0x6e, &(0x7f0000002000)=[{&(0x7f0000001b00)=""/68, 0x44}, {&(0x7f0000001b80)=""/191, 0xbf}, {&(0x7f0000001c40)=""/200, 0xc8}, {&(0x7f0000001e00)=""/201, 0xc9}, {&(0x7f0000001f00)=""/200, 0xc8}], 0x5, &(0x7f0000002080)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x90}}, {{&(0x7f0000002140), 0x6e, &(0x7f0000001d40)}}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000002240)=""/202, 0xca}, {&(0x7f0000002340)=""/134, 0x86}, {&(0x7f0000002400)=""/204, 0xcc}, {&(0x7f0000002500)=""/92, 0x5c}, {&(0x7f0000002580)=""/205, 0xcd}, {&(0x7f0000002680)=""/210, 0xd2}], 0x6, &(0x7f0000002800)}}, {{&(0x7f0000002840)=@abs, 0x6e, &(0x7f0000002b80)=[{&(0x7f00000028c0)=""/249, 0xf9}, {&(0x7f00000029c0)=""/250, 0xfa}, {&(0x7f0000002ac0)=""/180, 0xb4}], 0x3}}, {{0x0, 0x0, &(0x7f0000002e80), 0x0, &(0x7f0000002f00)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000002f40), 0x6e, &(0x7f0000004000)=[{&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000003fc0)=""/42, 0x2a}], 0x2, &(0x7f0000004040)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}], 0x9, 0x10110, &(0x7f0000004340)={0x0, 0x989680}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0xa, 0x0, {0xe}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x3ffc, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') 10:22:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8481, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) fcntl$setsig(r0, 0xa, 0x24) [ 1746.594730] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 10:22:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x2, 0x89, 0x10}, 0x18) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000001c0)=0x5) 10:22:53 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB="2c6dc5f24d2a27516391fdb55061736b0000000000"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1746.663132] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1746.668270] loop3: detected capacity change from 0 to 135266304 10:22:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r0, r1, 0x800) syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x3, 0x1, &(0x7f0000000280)=[{&(0x7f0000001e00)="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", 0x1000, 0x5}], 0x880008, &(0x7f00000002c0)={[{@commit={'commit', 0x3d, 0x400}}], [{@smackfsdef={'smackfsdef', 0x3d, '\n}-+[:-&:+'}}, {@euid_eq={'euid', 0x3d, r0}}]}) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='user.incfs.size\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1076) 10:22:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r1, r0, 0x0) openat(r1, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) close(r1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:22:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) readv(r2, &(0x7f0000000400)=[{&(0x7f0000000140)=""/86, 0x56}, {&(0x7f00000001c0)=""/46, 0x2e}, {&(0x7f0000000200)=""/186, 0xba}, {&(0x7f00000002c0)=""/65, 0x41}, {&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x6) [ 1746.783203] loop2: detected capacity change from 0 to 4096 [ 1757.214797] hpet: Lost 1 RTC interrupts [ 1759.534889] hpet: Lost 1 RTC interrupts [ 1759.986856] hpet: Lost 1 RTC interrupts [ 1760.215651] hpet: Lost 1 RTC interrupts 10:23:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8000000000062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffff80}, 0x80, 0x5}, 0xffffffffffffffff, 0xffffffffffffdfff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'mangle\x00', 0x0, [0x3, 0x7, 0xb7e, 0x3f, 0x8]}, &(0x7f0000000040)=0x54) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = signalfd4(r0, &(0x7f00000001c0)={[0x6]}, 0x8, 0x81800) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000200)={@loopback, @loopback, 0x0, 0x1, [@rand_addr=0x64010100]}, 0x14) 10:23:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x80, 0x0, 0x2, 0x0, 0x9, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x1000, 0x2, 0x54d9, 0x7, 0x800, 0x4, 0x3, 0x0, 0x1, 0x0, 0x5}, 0x0, 0x10, r0, 0x3) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40341, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:23:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = eventfd(0x7) fallocate(r0, 0x1, 0x1, 0x1) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff82}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:07 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r3, 0x0, r2, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r4, &(0x7f0000000100)=0xfffffffffffff674, r5, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3, 0x9, 0x0, 0x17, 0x0, 0x8001, 0x100000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x58a249fe, 0x0, @perf_config_ext={0x6b4d8415, 0x400}, 0x5100, 0x0, 0x108ed0c4, 0x4, 0x6f55, 0x8001, 0x9, 0x0, 0x6, 0x0, 0x5}, r3, 0xe, r4, 0x1) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x107a) 10:23:07 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1760.823333] loop3: detected capacity change from 0 to 135266304 10:23:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x107d) [ 1761.303604] hpet: Lost 1 RTC interrupts [ 1761.395894] hpet: Lost 1 RTC interrupts 10:23:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x5, 0x20, 0x3, 0x20, 0x0, 0x4a76d2f8, 0x8210, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x58, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x68, 0x1, 0x0, 0x4, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x100}, 0xffffffffffffffff, 0x9, r0, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:21 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x4000) 10:23:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='vxfs\x00', 0x20800, &(0x7f00000001c0)='proc\x00') 10:23:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="67070000000000000036e24b37cac1e3d21bd5bdb1ea1f932202e2bd199cc66c21c7dc08b16635657c6d7911995531ef2bc907440370f5d8aab7dcb528770f1e4bc484503b7482"], 0x40) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x6000, @fd_index=0x1, 0x2, 0x0, 0x0, 0x14, 0x0, {0x2, r5}}, 0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r6, &(0x7f0000000880)=""/4096, 0x1000) [ 1775.001673] loop3: detected capacity change from 0 to 135266304 10:23:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000200)={0x0, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000001880)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB="2c5f58c7a5ba94554400"]) recvmsg$unix(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)=""/155, 0x9b}, {&(0x7f0000000400)=""/91, 0x5b}], 0x2, &(0x7f0000000480)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x110}, 0x10000) mknodat$loop(r1, &(0x7f00000005c0)='./file0\x00', 0x800, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:23:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000001e00)=""/4095, 0xfff) 10:23:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, 0x0, 0x56) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r4, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) socket$inet_icmp(0x2, 0x2, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r6, 0x0, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xfff) 10:23:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) ppoll(&(0x7f0000000040)=[{r0, 0x4001}], 0x1, &(0x7f0000000140), &(0x7f0000000200)={[0x2]}, 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @loopback, @remote}, 0xc) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) preadv2(r1, &(0x7f0000000680)=[{&(0x7f0000000200)=""/234, 0xea}, {&(0x7f0000000300)=""/103, 0x67}, {&(0x7f0000000380)=""/69, 0x45}, {&(0x7f0000000400)=""/141, 0x8d}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f0000000140)}, {&(0x7f00000005c0)=""/136, 0x88}], 0x8, 0x5, 0x0, 0x2) 10:23:21 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x63], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:21 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x1890, &(0x7f0000000300)={0x0, 0x87e5, 0x10, 0x0, 0x10e}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000400)=@IORING_OP_CLOSE={0x13, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r2}}, 0x800) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r4, &(0x7f0000000100)=0xfffffffffffff674, r5, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000280)='./file0\x00', r4, &(0x7f00000002c0)='./file0\x00') socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x8c, 0x4, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFTA_CHAIN_COUNTERS={0x64, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3ff}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffffffffffffe167}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x800}]}, @NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x41}, 0x4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r6, &(0x7f0000000880)=""/4096, 0x1000) 10:23:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',mas)kEND,']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x80, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, r1, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0xf) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1775.170838] loop3: detected capacity change from 0 to 135266304 10:23:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x80, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000001e00)={{r4, 0x41, 0x1, 0x3, 0x50, 0x6, 0xbc91, 0x1, 0x4, 0x101, 0x7fffffff, 0x81, 0x1, 0x5, 0x20}}) dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r6, &(0x7f0000000100)=0xfffffffffffff674, r7, 0x0, 0x0, 0x0) r8 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@private1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x80000, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',dfltuid=', @ANYRESHEX=r8, @ANYBLOB=',loose,debug=0x0000000100000001,euid<', @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC=r9, @ANYBLOB="2c646566636f6e7465787414abba2c7618a87461756469742c48756b643d77f4c203ace333894787837437fe4ae84a7d1ab3d9dc9a1e25b2fed71c44f53c36b5435661ba1b4d40875e6fb8cd4634d26dfc27e7dac078e65921357a682a871dd34420a80d7b22aa1f013da2aa88916b28b63971503595721f96c3", @ANYRESDEC=0x0, @ANYBLOB=',mask=MAY_EXEC,smackfsfloor=-,\x00']) 10:23:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'team_slave_0\x00', &(0x7f0000000140)=@ethtool_test={0x1a, 0x80000001}}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200), 0x100, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x18) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8000}}, './file0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) write$P9_RWSTAT(r0, &(0x7f0000000280)={0x7, 0x7f, 0x1}, 0x7) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:23:22 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x0, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1775.349171] loop3: detected capacity change from 0 to 135266304 [ 1789.483167] hpet: Lost 1 RTC interrupts [ 1790.487100] hpet: Lost 1 RTC interrupts 10:23:37 executing program 1: openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x10, 0x4, 0x0, 0x1, 0x0, 0x20, 0x440, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb7, 0x0, @perf_config_ext={0x3, 0x8000}, 0x1000, 0x80000000, 0x4, 0x1, 0x9, 0xfff, 0x6, 0x0, 0x8000, 0x0, 0x7fff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) 10:23:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) sendmmsg$inet(r3, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000180)="c4e16a1e9155c4638c53aed4a509ba24def5c3650c1b34aa9f2b4b2f5d5d8817", 0x20}, {&(0x7f00000001c0)="ba1ddc0286a2b3c27f6b80ed47a807aeb0189481add1b95c49b8efc6198f01d9b558ed07f0e93c8e49", 0x29}, {&(0x7f0000000200)="825609a0dc88c0abe19735c6193ac7d7e1502b3dadf5dccf71d48b6faf5a0c27f05927a09783240fd1d503fdd3df6cea8e3aa07dbcfef08b7b5d79bd", 0x3c}, {&(0x7f0000000240)="005afa693024f6fb5368df2e9ce68c68a05e7255bd035d1dfc65e22791de5edeb69fcdc601a3c318453b9eb032827af0b79e78", 0x33}, {&(0x7f0000000340)="045e77bc89b89c1fb742e9ce8ac5626fdc7e4f20c242a5c95ba1440f98177444c9227f01d6e26c73a4b5ae5b8a348c", 0x2f}], 0x5, &(0x7f0000000400)=[@ip_retopts={{0x4c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x3c, 0x54, 0x1, 0xa, [{@multicast1, 0x65}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@multicast1, 0x1}, {@empty, 0x8f88}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x261c}, {@broadcast, 0x3}, {@local, 0x5}]}]}}}], 0x50}}], 0x1, 0x20000000) 10:23:37 executing program 2: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r4, r5, 0x800) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r6, r7, 0x800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x14442, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@posixacl}, {@fscache}, {@dfltgid={'dfltgid', 0x3d, r5}}, {@privport}, {@dfltuid={'dfltuid', 0x3d, r6}}, {@version_u}, {@afid={'afid', 0x3d, 0x3}}, {@aname={'aname', 0x3d, 'proc\x00'}}, {@msize={'msize', 0x3d, 0x3}}, {@aname={'aname', 0x3d, 'proc\x00'}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@subj_user={'subj_user', 0x3d, ')'}}, {@fowner_gt}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@euid_gt={'euid>', r8}}, {@fsmagic={'fsmagic', 0x3d, 0x7fff}}, {@seclabel}, {@smackfshat={'smackfshat', 0x3d, 'proc\x00'}}]}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r9, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB="2c6d61736b454e442c00181a056213ebde07d21a540bb272ee129c7a2ed23c43a5173299e38976914d556f7a79e6cd465f11555a89ef6f75"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80, 0x2}, 0x0, 0x5, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000003c0)={0xff, {{0x2, 0x4e20, @private=0xa010101}}, {{0x2, 0x4e23, @rand_addr=0x64010101}}}, 0x108) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r2, r1, 0x0) openat(r2, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x1, 0x0, 0x98, 0x0, 0x4, 0x2000, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x800, 0xffff, 0x400, 0x4, 0x80000001, 0xb309, 0x5, 0x0, 0x6, 0x0, 0xfffffffffffffffa}, r0, 0xa, r2, 0x8) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x0, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1790.768425] loop3: detected capacity change from 0 to 135266304 [ 1790.800817] 9pnet: Insufficient options for proto=fd [ 1790.828081] 9pnet: Insufficient options for proto=fd 10:23:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x4a770120140a1f7d, 0x0, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="9d717c40e80910ce74911b4a250b33cb0ca59ca5685839921326ec43b01ba422eaa589207017eba84ad45e210237ca438d54d9c565e8017dc19a8c4a007baa878db10ed9e86913cbedfe0504cee5d67de1abdaf758e7d385cbf1543ad8eb45d6da0418eee5626f84", 0x68, 0xfff}], 0x100081, &(0x7f0000000240)={[{'[('}, {'proc\x00'}, {}, {'proc\x00'}, {}]}) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000100)=0x3f, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="de090200000000000000dcff0000020800000000e800000000000000"], 0x1c}}, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='sockfs\x00', 0x2420, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x80, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000000406010100000000000000000acd519897000100070000000500010007000000122dcc73208fd6808c261af2f649e51ab18b52f6dee867794a5799155facbcfe27dc7a8a861e6e8cabffd4c5f7ee08a317497c5d83dbf1b12e3d8dfa4b65715a925d0d0d34591911525fda010f7ba497c5f2fd00000000000007e03330ee3d3e0229b7ee5c156476756a479a6a0a44a8ce52b9709fd1ea5a56ed442607c4eaf5892095bf362f83007da627cbf29c19090024cb3030d1261d9601c40a969e3a6fec9c4fbca94d6804"], 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x40) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r4 = dup3(r3, r2, 0x0) openat(r3, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) ioctl$AUTOFS_IOC_EXPIRE(r3, 0x810c9365, &(0x7f0000000340)={{0xfffff000, 0x8}, 0x100, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r6, r7, 0x800) fchown(0xffffffffffffffff, 0x0, r7) syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x20002) getsockopt$sock_buf(r4, 0x1, 0x1f, &(0x7f0000002e00)=""/4107, &(0x7f0000000140)=0x100b) [ 1790.968056] loop3: detected capacity change from 0 to 135266304 10:23:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x10400, &(0x7f00000002c0)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0xaa65}}, {@timeout={'timeout', 0x3d, 0x5}}, {@common=@cache_loose}, {@timeout={'timeout', 0x3d, 0x3}}, {@rq={'rq', 0x3d, 0x7}}, {@timeout={'timeout', 0x3d, 0x1}}, {@sq={'sq', 0x3d, 0x80000001}}, {@rq={'rq', 0x3d, 0x80000000}}, {@sq={'sq', 0x3d, 0x80000001}}], [{@uid_eq={'uid', 0x3d, r0}}, {@subj_role={'subj_role', 0x3d, ',!@$]$'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@smackfsroot={'smackfsroot', 0x3d, 'tmpfs\x00'}}, {@appraise}, {@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@seclabel}]}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1791.004541] 9pnet: Could not find request transport: rdma [ 1791.011923] 9pnet: Could not find request transport: rdma [ 1791.026715] loop4: detected capacity change from 0 to 7680 10:23:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={&(0x7f0000000140), 0x6e, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/130, 0x82}, {&(0x7f0000003e00)=""/4096, 0x1000}], 0x4, &(0x7f00000002c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}, 0x122) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1791.093884] loop4: detected capacity change from 0 to 7680 10:23:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES64, @ANYBLOB="2c6dd90c35e06a442c00"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x0, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'vxcan1\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="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"]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1791.159155] hpet: Lost 1 RTC interrupts [ 1791.172476] loop3: detected capacity change from 0 to 135266304 [ 1797.628245] hpet: Lost 1 RTC interrupts [ 1798.699208] hpet: Lost 1 RTC interrupts [ 1798.987277] hpet: Lost 1 RTC interrupts 10:23:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4f23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:23:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="67070000000000000036e24b37cac1e3d21bd5bdb1ea1f932202e2bd199cc66c21c7dc08b16635657c6d7911995531ef2bc907440370f5d8aab7dcb528770f1e4bc484503b7482"], 0x40) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r5, &(0x7f0000000100)=0xfffffffffffff674, r6, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd=r5, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x3dc1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) 10:23:52 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/209, 0xd1) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x802, 0x12) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x180400, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000280)=ANY=[@ANYBLOB="000000ea04af55ca8200000000", @ANYRES32=r2, @ANYBLOB="01040000000000002e2f66696c653000"]) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000200)={'security\x00', 0x2, [{}, {}]}, 0x48) 10:23:52 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000001300)=ANY=[@ANYBLOB="1d580d3f7a65de3fc026c2151295f4306c16b3852fe88c37d308f9b0b742604c87d74bb59e496db30ee1d72b45610424744564f74d4debe113231f259b59bad9f4712b755eac945f538d720433cc622b2825981bd7d6b7acc237d34ebc7d9060d234f7912034dc05015180a790664ccaf18f3a93364ad76ea9016eb002653e3b260173c759242fa1cd9aefa68c785fc102d54fba3bd4adfde9dd4d311ce09388b393f145ad5fe09c3d21ac2bf95ee54b928546bbfab02608c1a57a8c7a55b703485489201473cfe4091410bf514e46b469c5406207c05a847a254fc5d7f86ae3996629383546b6afcfa40e9a063f788a03b9f34a89c18137866b0f8f3e2b90a0368c", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r6, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) recvmmsg$unix(r4, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x400, 0x0) copy_file_range(r3, &(0x7f0000000180)=0x401, r5, 0x0, 0x9, 0x0) getdents64(r7, &(0x7f0000000300)=""/4084, 0xfffffffffffffe63) 10:23:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r1}}, 0xfffffff7) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) pipe(&(0x7f0000000300)) recvmmsg$unix(r3, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r6, 0x0, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(r0, 0x0, &(0x7f00000002c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0xfffffffd) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, 0x3f9, 0x100, 0x70bd2a, 0x25dfdbfe, {0x0, 0x1}, ["", "", "", ""]}, 0xfffffcd7}, 0x1, 0x0, 0x0, 0x44000}, 0x400c000) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) 10:23:52 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x7ff}}, './file0\x00'}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000340)={'filter\x00', 0x0, [0x8, 0x6, 0x80000001, 0x6, 0x2a9]}, &(0x7f0000000240)=0x54) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd(r1, &(0x7f0000000040)={[0x3]}, 0xfffffffffffffec5) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000140)={{0x2, 0x4e20, @multicast2}, {0x6, @local}, 0x0, {0x2, 0x4e24, @multicast2}, 'vcan0\x00'}) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) fchmodat(r3, &(0x7f00000001c0)='./file0\x00', 0x60) 10:23:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x0, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:23:52 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@random={'osx.', '\x00'}, &(0x7f0000000200)='[^{(%,+:/\x00', 0xa, 0x2) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000001e00)=""/4075, 0xfeb) [ 1805.409861] loop3: detected capacity change from 0 to 135266304 10:23:52 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x34, 0x0, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1805.548002] loop3: detected capacity change from 0 to 135266304 [ 1805.895292] hpet: Lost 1 RTC interrupts 10:24:06 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x0, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x1) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x9000000, @remote, 0xf2f7}, 0x1c) 10:24:06 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000800)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r1, &(0x7f00000007c0), 0x0, 0x0, 0x800}, 0x3) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x1, 0x1, 0x0, 0x7, 0x0, 0x2dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x8}, 0x0, 0x5, 0x0, 0x5, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000001e00)=""/4072, 0xfe8) r4 = openat$incfs(r0, &(0x7f0000000140)='.log\x00', 0x8040, 0x20) unlinkat(r4, &(0x7f0000000180)='./file0\x00', 0x0) sendfile(r0, r3, &(0x7f0000000040)=0x6, 0x8) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x4080) preadv2(r5, &(0x7f0000000680)=[{&(0x7f0000000200)=""/127, 0x7f}, {&(0x7f0000000280)=""/143, 0x8f}, {&(0x7f0000000340)=""/193, 0xc1}, {&(0x7f0000000440)=""/222, 0xde}, {&(0x7f0000000540)=""/50, 0x32}, {&(0x7f0000000580)=""/217, 0xd9}], 0x6, 0x3, 0x6737, 0x19) 10:24:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB="2e01eaffffc80e62fa00"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r1, 0x0, r0, 0x2) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x9, 0x80, 0x6, 0x3f, 0x0, 0x4, 0x22404, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3fff, 0xc5a}, 0x2, 0x76, 0x3f, 0x3, 0x7ff, 0x1, 0x4, 0x0, 0x7}, r3, 0x0, r2, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3}, 0x10, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r3, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r5, &(0x7f0000000100)=0xfffffffffffff674, r6, 0x0, 0x0, 0x0) openat(r6, &(0x7f0000000040)='./file0\x00', 0x200440, 0xb2) 10:24:06 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = geteuid() statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r2, r3, 0x800) syz_mount_image$tmpfs(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000740)=[{&(0x7f0000001e00)="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", 0x1000, 0x1}, {&(0x7f0000000680), 0x0, 0x10001}, {&(0x7f00000006c0)="d5ca470d8839bdd868eff3c45ae0a4c13d57aaef6ab2396372dfd3a574d7b951c8935beeb8abd9a9cc86a02a330b6264669f047387f3c2bdaee5d60da42f09d86eeb9e37313080cecbcd940b90113e7e3d1ff72170aca249900d98c45df2c26896daba81458a3116c6722a81c7c06a2c0541d03c8dda0c3c60", 0x79, 0xff}], 0x24, &(0x7f00000007c0)={[{@gid}], [{@euid_lt={'euid<', r1}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_lt={'uid<', r2}}, {@fowner_lt}]}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/170, 0xaa) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)={'L+', 0x3}, 0x16, 0x2) statx(r0, &(0x7f0000000340)='./file0\x00', 0x6000, 0x10, &(0x7f0000000380)) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000340)={0x1000, 0x41d0000, 0x4, 0x7fffffff, 0x9}) r4 = getegid() mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x24010, &(0x7f00000001c0)=ANY=[@ANYBLOB="43000079a0d5dae100000000000000", @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfltgid=', @ANYRESHEX=r4, @ANYBLOB=',privport,version=9p2000.L,cache=mmap,access=client,audit,smackfsfloor=@@,[@.\',##\',\x00']) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1819.496830] loop3: detected capacity change from 0 to 135266304 10:24:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x958004, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000040)}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/203, 0xcb}, {&(0x7f0000000340)=""/169, 0xa9}, {&(0x7f0000000400)=""/67, 0x43}], 0x6, 0x3, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) dup2(r3, r0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x0, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x6) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',ma\a\x00\x00\x00\x00']) mkdir(&(0x7f0000000040)='./file1\x00', 0x1) openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)={0x24000, 0x10, 0x10}, 0x18) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x4a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffff80}, 0x4406, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1819.623065] loop3: detected capacity change from 0 to 135266304 10:24:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'macvlan0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x9, 0x29, &(0x7f0000000280)=[{&(0x7f0000000200)="252fbab7ebc9320e9f7e862068c33fc1c2902212968d705e69733c7f1603f941", 0x20, 0x9c}, {&(0x7f0000000240)="28ef7c2653df8df5d6d25c6447d088432a410652cec360035a6144bc875969712057fa57b6ef2262cc7af1535eaefc6611e015bc65f6ab728955ba", 0x3b, 0x2}], 0x100000, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'maccroatian'}}, {@utf8no}, {@utf8no}, {@shortname_win95}, {@fat=@showexec}, {@utf8no}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'none'}}, {@numtail}], [{@subj_type={'subj_type', 0x3d, ':,}%#[&.'}}, {@appraise}, {@obj_type={'obj_type', 0x3d, '(-!.'}}, {@smackfsroot={'smackfsroot', 0x3d, '9p\x00'}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="67070000000000000036e24b37cac1e3d21bd5bdb1ea1f932202e2bd199cc66c21c7dc08b16635657c6d7911995531ef2bc907440370f5d8aab7dcb528770f1e4bc484503b7482"], 0x40) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000600)=@IORING_OP_WRITEV={0x2, 0x4, 0x2004, @fd_index=0x2, 0x1, &(0x7f00000005c0)=[{&(0x7f00000002c0)="f5867f9d6abc80287551fea0c36ae0c1fa5da9e385b81ae47c0cb45804a1be19fb30f536cd535c2c78970f6e0381599ef74c15c0c8b2ec00f3c0ccb92cd88514241338f501a0bf2be7179f77615f0a32db130f9d7e680e1ed588c1391ca0943a1b4d1755871e28f67de4edb714c034bcb12d25f3010ded66a0624afe3a71af8eb5c3c7975ffe15b423b44f77a5447135f7077482e4697cec40efe2696f0cb67c332a85084d", 0xa5}, {&(0x7f0000000480)="9a90a7796de988d62dd399415c826958e50c9979b5e1f204620073269011551d318fd761cc11f9b814e3daac76de78cb883a13162218d217069db5f1be1507648f6f3bf53fcdba5f013a1f323d4b097ee71e17a4a63f4b9c78c32fca659eff6aa71a0e247700", 0x66}, {&(0x7f0000000500)="708ffdf2cdce0fca6c", 0x9}, {&(0x7f0000000540)="f049da353a1eae300fd89def7344add3d8e531a5bab481f3192d65e526aebca6d8248aba285d0143180af8185e5d74d7cbbaa4a995e3f100d5acb323488b51f184e78c3d8cdb8f22ea60dd84c1", 0x4d}], 0x4, 0x4, 0x1, {0x1, r6}}, 0x5) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r7, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x5acb4ee995bfc246, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000040)="5ea18a99", 0x4, 0x0, &(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x35f, 0x10062, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x100800, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/asound/timers\x00', 0x0, 0x0) fsetxattr$security_ima(r1, &(0x7f00000006c0), &(0x7f0000000700)=@v1={0x2, "4fced4e687740f"}, 0x8, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x9, 0x6, &(0x7f0000000580)=[{&(0x7f0000000180)="86c5ecbf8d7e37b7edd7b53240809ad78b0b2b5cbbcbf514972e2eca25f22499295f4c3acb6f69079351fc43e25613af21c9b12937b177c7979a4e07ecc1a0ebed560ae37a264a2c2476d5d1d746c1a854ec1b0f226638c69816ce7e6388ce69f65f337e2f2239c20be6a42890d6d2d30f78889f7e5e20a2435438ef86c89899b7c28942c232039ee4c193fb0f7b66193a1bc654809c0e80daae91966d09b3ce9b4778e2bd203a29e5591d370ea745a00c893fea804fb3f5f6d14d8d6e1eb5e752da6825984ea124498e59c194dc569d34c7bb19f45c690b8e3836fb1ba0b17b076df2713868f1", 0xe7, 0xf8}, {&(0x7f0000001e00)="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", 0x1000, 0x4}, {&(0x7f0000000280)="a85c336e2836652d8c1ba02b98d30c844ebe052774fa0c7aeedc429e7a0d3d052b356cda48b75c392e39d4c3c2e3fdc13590c8b2a8288d119b09bf52548d3e118517594c25b80d2e1342ac292bdf4b09df4b13e6fcf4fb1393d3c8446f2e9d8ac03d2a770b5a438af53ff904d97a8b5991f5e77b43bff3df08064fb367f1b2dd9284bde18b8c2158ee227b52073c4f375bcf4d7e", 0x94, 0x5}, {&(0x7f0000000340)="ce8e2cd5f6909a0e2c7d52f4b6276a177d8a1a8b65fc7f4ce51e43489ec8d7796116daa51dc4f8e3368685b7e55234c447908ea7faf008eae1422c8db7424acebb29d91d8105e172bcbb9fe0fb35ee4cd3db0014cb03c841a9f465b0c548bfdf725f2f5b8eafe6264730dd4a80415cbaaad1a1a36315f917464113438b446fc4fc0bf66f4f1ecbe52292c20b03d24959433fb587289ddbb0b2ddca948e735268e104f42e9fe99f3f0605b6b0f45454e1102baaa36a59041dfc9370b00be70bd7788c0cb32fab987c658688", 0xcb, 0x8000}, {&(0x7f0000000440)="c41f3b1f0937c8ae89eb45b0d2d473fc7bd47882f27da3f9e8a7c73b041c8dab1c3670df17eb717147c5d12a42c7dc7258a6d1bfba10c09249eca709f4ab1f37c54c384374905b923416273ea9cfdfc94bfb7478968085b9beae", 0x5a, 0x80000000}, {&(0x7f00000004c0)="f4a6373b28185bce98ab0c1e390243fe60d8815c1405062a5dedfd78fa99d4d614ce47bcf47f9f508b718af5929501dc5e9d538067fd03489d003f9fc532622002426423e42cc5108fc424a907f4a6aa0b872c18ba39a3ebe26d07882ad230bd0066d24881500ad8afe9f9cc707d0864eced70a5e6be9feee5d01060d7c48fa3bd35c1639b3bd2e39d6b556d3e4bc68d734533f89d3c2687376f4b989102edb1bff15f92021c1b991165c5bdd785f98c1667c09401dcc2bf0873b5d234320c9d", 0xc0, 0x80000001}], 0x20000, &(0x7f0000000640)=ANY=[@ANYBLOB='shoRtname=lower,uni_xlate=0,euid>', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) 10:24:06 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x31, 0x0, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1819.703209] loop2: detected capacity change from 0 to 33997312 10:24:06 executing program 5: ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000040)={'xfrm0\x00', {0x2, 0x0, @initdev}}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2d3, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffefffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1819.768899] loop3: detected capacity change from 0 to 135266304 10:24:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) r2 = openat(r0, &(0x7f00000003c0)='./file0\x00', 0x4000, 0xc) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000400)={'filter\x00', 0x0, [0x9, 0x6, 0x9, 0x2, 0x5]}, &(0x7f0000000480)=0x54) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1e8, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x100000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x63f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x400}]}, @TIPC_NLA_MEDIA={0x40, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x848}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8e6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x40}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8001}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK={0x64, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1000}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}]}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x20000000}, 0x2004c040) 10:24:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000400)=@ng={0x4, 0x1, "3e8d2c81f089b074b6f9ef7362189d4146a834c6"}, 0x16, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f00000006c0)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa60761c6d891c169e6d201ea024747b8", @ANYRESDEC, @ANYBLOB]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'hsr0\x00'}) readlinkat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/160, 0xa0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x3f}, 0x8b00, 0x0, 0x9, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r3, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000e4048f01000000001c000000000000000000000008000000", @ANYRES32=r5], 0x38}}], 0x1, 0x0) ioctl$SG_IO(r2, 0x127f, &(0x7f00000003c0)={0xe00, 0x0, 0x0, 0x0, @buffer={0x300, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pidfd_open(0x0, 0x0) 10:24:20 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) statx(r1, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x100000, &(0x7f00000004c0)={'trans=unix,', {[{@cache_loose}, {@cache_none}, {@cache_mmap}, {@uname={'uname', 0x3d, '.*[,.'}}, {@cachetag={'cachetag', 0x3d, 'omfs\x00'}}, {@loose}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@cache_none}, {@msize={'msize', 0x3d, 0x3}}], [{@obj_role={'obj_role', 0x3d, '/dev/nullb0\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x400}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_measure}, {@dont_measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\}\xe1-^'}}]}}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = fcntl$dupfd(r0, 0x0, r3) mount(&(0x7f0000000140)=@nullb, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='omfs\x00', 0x1206000, &(0x7f0000000280)='proc\x00') ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000eaffffff", @ANYRES32=r3, @ANYBLOB="08f1ffff000000002e2f66696c653000"]) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) 10:24:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x512f, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x8, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x85) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0\x00') setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0/file0\x00', 0x18d8c1, 0x20) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = socket(0x1, 0xa, 0x800) getsockopt$bt_hci(r2, 0x0, 0x2, &(0x7f00000001c0)=""/74, &(0x7f0000000240)=0x4a) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@ng={0x4, 0x5, 'i'}, 0x3, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) lsetxattr$security_ima(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), &(0x7f00000003c0)=@md5={0x1, "1618752a0db3e7674aeef12bbf4533ad"}, 0x11, 0x0) 10:24:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) getpeername(0xffffffffffffffff, &(0x7f0000001c00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000001c80)=0x80) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000004100)={{0x1, 0x1, 0x18, r0, {0x63b64646}}, './file0\x00'}) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000001cc0), 0x80000) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004000)=[{{&(0x7f0000000140)=@qipcrtr={0x2a, 0x0, 0x4000}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="60bee531d081a72abbc6fdae46", 0xd}, {&(0x7f0000001e00)="a484e63baa4ab0a5e63d54128b9c555231db9c432f54e93cd1b5b9f66eda05077f80daef69315b0a9e09413576503e982dfc128070721c86ffd5c81083d2b3d9ac3b292315d16cd7e95a1b02a2cf817768e0002477f1c3f56585bef989b472cd7db3e23cb4b15285b45a77ef10ad725f4fef90074396749a1e86ab1a8683c09224eaec07891cc1742a961f571a496c7c983b4d10f2dae64b9fb92aaf8dcc04505954ae48a9a9dae3c886a208a013a0d30113179254999e3b551ba4d8d6b3c01680c98733e5f825679083b4b5965b246523b2989b783197553e0f94e6e08c24d480e0b5a7baa4ac0235741e1b64ecbfcc4ba8ebc0dea043fac30ab7e0f7c8ef639390a77168c525278d331692814e833a5be6e532c2829665442fab07216d74819792e0a5b874b9e0891fa09a0a92fa2aa2d83ab4e4da5dd1694b9da18904c342cbfa5e3da8950a375dd58d75d2bba501952acb89f64ac9fdf81e362104f34f2907cf2cca15062b572cb05d2ca38a2322d0e3f11d62b6241adfd88918bcaa9c19ecc74e510919e62ed6f233a80464d0f2af047d74bb1d0e06228977bc943bf69876f72198a27720a24650e03271324790caaf0cb191fe32fbf83b568712b4235f24505acbfb1ada014315752953fc0285ee79336bcd4c215d9dd63a63843a69be6c632b239f3225e1deff91cb6d4b9cb313ab7056dd461ea8f8fee30ee74c7c1e655ed392b18e13e1430b6e6765f7a8b69fbd5259940931bf79720d0278b66881bb30389b859e048ec5ccc9930db61f879c6918aafd2ddc5c9269096f00c99e28b0847812d01d8855f35511f97939112301b02b2fbf4fc0c6fd5b83d4fe5d5f49867c6576d4a6f0af3b4c30c1bd59458005a4125c1fff42fd0ce5a6cc07a892a3a2abd35b4fbec0c223210e0069fa42c916ff47bfc4259fe5049f03b67ab73d7d2dd928934627f5f8603e8c1a8b16b25e79771b9889666d8628054969e7e3ffc444acecc062e383e756702a66358414724fb4579e626fb5f887ee30fbad148e276fdb81bd888ec04bf4bd2e55acf1b702f9b9731dfd857ec49b08af1e98719cf608c2f31affb82ae72f9b068322881f7e327df0282c50c968fce8e4451b250e298027f13851b971c1422d27a35e9c1c8c3353ccb1cd1cf3439d5ab3aa20318b9f675211d24faa3011d1b0856e5cbf96ead09c4557b213184b60aa3508c1689da5b4a82194f4e5774ef914ee05228297ba306caf27f86b0c34dfe654512f32dadd13e64acbd0d8dfcc1cad80b15e02d3347cdd5fb735ad8f2a0dc0c297042d3d0ec3753cef55ce5cfdba9215d67120b9d3a7f8631fdd0f25ed16975f900ddb40ba2ea641319fb5bd9a368531edf40b05d0a836ca4e7687fe62bfe089e711d19e003a9d0660b7489e8cebbb97345f7d063d2ced503cdb9695e3d56b79c290a38a2df91a5216951e28c4157b3b2051df0267a51473841832b422238523183846e844ce8c49eb4307510d7d711137411eaafda3b392be8472160e987d90acddc75b89ef5e766be3f2fdd2422e2520f5bde59f4ad7a8ee196e52290fb4bf6cbad9defb48a42ff6e5c5f55b57cf129b006a1f3c620701b69e25a4f0c1061767bc8b0352ea690734c5fdfad200a97a61084eb977472c9047f8ac357235261d817bfd2a84b9f5f030d5bd0282801fba3bd116513fbeefa4fc3f15955a593e661433d16a404f0d6f38c6cebf603a46581dea535c455e40026130e2b3ca80dd51399686afa77b7b911a0c374a2184cee0f2e2539bb4ff815dca86562ea22bee7112ec9dfb331654809664d18ef622618605d8430203a414b3db7c02a451c95ee4220351a4461491d5d6689b190a924eeb589d4cb937f9252aab5bf8ffd9fcae6dbe4bd0451ad824711a4d45be0bccc6d23d9d95ca5443637c74f162b699daf24dbe9192b3ed613ef1a8a7435581c41638e2f5da57107938cd5c46af2ef1433b142ec00e949f63533f53700fe7e71de9aa7504d91737a6b71bd451b940982cb4539b9393ee21c958fee0f129be0623ba947a4111e7fb21fe4ca243ed09622db5287ba46fbb05e7e08498e2b6638e6e47438896cb8b9bacff3467a3d3029f478e988850c430702ba90bd2390faecf78008eb03b69bb2b85da33c6c79c6157e24666e52020615f293c70b299e353e93440c5e332a670a32c79745ea689bea58d82f293e118fe30a9e6455391399cdbd6fb4cd82e08214c7cdfe04c5e67fed9ea1b35fc2a3b4df3d50086e1f4f984ea9493e3cd3c510d720728614db0e3299477458963e028c2c36f957911921926cb1416129e9d93f95902d5c309da5b657906e82f7029dd1f269dc224106398bdab635572564c6b0c3753f612c4c5871e7f65ae95883d5f6207961c22ffc64e8b83c752d44958783239f87247174e4352cdbbe3274e531f0d30a050f5316839486132405128e6c3ab1e0ce99622be87a7259585afff149a1e7604b333fa649ea50348c2f0a1d70a3b779cbcf0047f6e81e4f5958109ad66ee7420750a0883ca1fe1779d8137fb715f204ecd39afc72f3eac279b55f8b49de6c0b09bb13b2c66eaf9ece6a0dce73d5e5d70ab47753644041cb82834e25eddb09cc70df9ed83a88882a7ca0e1850c6ef4d7432cb0d37239cb0d906a6cf6b388524c688bfc51e3fda4cf6fd4b61a7e22b67d82371f514376af02af83916ef41da0debd8ac2ca5f465f8c7f241ccbde315184cc76e7f096271b95ad114be269285e45cc5105f0a8492ea4538eb321d07b4a56a139013617de76675141066db0b659378ea1aee5aa4c516e3f4c51c28ab3086696dac3ce1962b8c9c466e11377a630f714c3c0632a56fc50e40fab3d82bd1c42d1f8884b4a436d1b79c5d8334c52b05d09b9ce22d3d75a59e8a0fc21b95620f736d184ef58d2d4c979f1826a6b7774600d2661b662bbeacf46b23ebc4403893bfe502550e2e053287846ef0a117ad8a067c7e8185e4147c1d46d8704c19093677fad3c189e5006bc90db02f38b225198ae5e465f08b0cd1f19ee9d875dcdcb29e3be6664fdde467cee8912c7aa512d54e1d77022fb11241ec77d1671f108d56eccc240a93a4cd5014fdee6b080ad6ea19d3a862798e4d054d3d9f511034048d0dbd12c14333180930ce9bcc5adfca243be424232d8849fc7c88b2adf9d46568693bf4f54ac01dcbff1264effa47d2cd488d7e10d49e428ee10f9dbb7c43b2b6068410028d5024d473a3c838133b3368e0501f4ed33f27fd238ce5b6fb66fe247717b2eb267f0b3088c6d863e228c50260699f81873eee5f8ce9c8ffe952d5833097f524a20d505332a36a3785e2b73c47f3e067f4b3324ef4772545fbdd8f4a46f681fef007c90a119e5085d63a8e2aab8103578ca8c777094a45aba097d374e6c395ac942f38346c46979e755c9c8c4d507612cc39d6d04e6ec4786ad90383819693ad4733cdca6921593044cfad5564e6b9a7b21c27751b23153f32f7584b1de4e0e085163e260bf30c0a899559cb15cd8231011d7f0e067b3043af8647a248acda385b987874f5b59ea2eed4e25040156899eab0b9e4bd41df22d20f601e95b60d877245579d60f5cec44e02280e7b16e41b861f3b6a0c5fd6e53fc8e19d7b716380cbbba69d1133f2c1c161fa760f92060d8feb96ef244ee3010f12af2e700da58017b2ca8aa6fbfaff794c6247cf6c9e27c911d25f932d57436357a6e55ccf78940b2a85eaeb52fa5a0b27e25fe5e3d9af3c65ac689421606c1a394a0297c4d0f8e4b9f55f172171eb6217ded3474ddefbd852db2c9f90315bdfadef5c7250a68540d26c5e55bc5f668f17630900001719925bb0eb114191a54a4e06245038a8438db288f083cb524ef15711e2310249d16b92e82fc4f5cc82e66547f807fb33d10fe6854ef697a8abe9c25b96c0bfaf09e96dd965ebc61dbdb37c2acf1c641ffb3eb800cde1acade72da9f979f13d198715c04ba5daff46def8538f36cb8ed8274f9f296c39a82b31c50aec1c829f95910815b72225c4e1ec9627c963b2038850ceacb69602893ddd49e1e0f8bbee1d7a1f5a41ac9a43b777432b0368cbe06e2b78eee646025c656a7f96bf86357c1d4bd33327a876d108f6c10a4b5a7798ceff2f4795342e6d854394e03baa6b36455837d2188248df205a3e389b0e6b3c71810929a60ed00ac8b73d97ea365052b79a38732161d57b025a431f62aa0082fe07215b66c18962c768e0d878b2a6538f34ec552a913bc876f2e6c5cbf8a5c6aede00a4c655765c9441df83f295487e0dff0be5b7d3bcbb0f1285ec46dd2c546df63db738438645f6628d60d18fb5d60cd217652d1bf0f7ecdfdf85f5165ed21e9f9d54e65798e709d074511fa5034ebfda44cfad30e869ecdab70cac35c95cd8f0298189acd8c467cfc078780a791a9d7200879074d7e1ab10ecaaff76aec97690bf77f7a1a26807057a6b3a7e7faffbf54bb458f3a5d841a53361343af899fce90679d039dc6892ca58bb815aec7da65deac536ba82116e9456440eacb810b75d0b015dbf7d43df9aa7a07f6b7b09643a93db883a3c284e2c0ee37c4705c8e6c3c4bd5d0cb3d0d50d81267f488ed9313a6dcdc4fae3eacee2a12bda0f76764c74ede1b441b3acb4d90ac498124584c28730dcd165e5a8b774efcee064e5ef034ed277430c901c219f2ae9f646dd446d0052eda24a8418eb40b0938422c75d199a84a055b0e64345dd36f0672618a8a389318684ab4c646af035bc4926a1361fcec0c91da4c79015d59d13a36df57866c25d02e67573f5811a4ceb47956e9816db2a0155712184c9d9b9e624f1b3c8508b500b1cd1a1e94700580aa1050d58d64b947420919bd00a06af207db7da8d2b05febe9cf6febd5528f2211f335e75ce7409a15c3944c0efb876363cca9ad68ad6b74daef80334bb22c6aa094a4be935dc2879218b96a293cdc2cd6ab2c42313baf6ec66d3debcc79618cd80f6e05dd960820302f268692d63c2ddd64545bccf83470663fd21d407f212a5d3044fb605cbb1d6eaa16fae5ff40bda0530b79d893bc1f4d81988937765bf8c94f6c8db4c8e5cb8af2cad4c80cb1928462a75579205efae3191795d362ba202e80dedc786a32ef8dbfa07e1a64973285192a4ae362bb4779dda60d7a29ac1e3f0cfc1636ea37a96456cba69570f7a1e7afd6b7b6a2e41581d46680d63a95eaffd82c3d168eedf3762b5b9aab9bb5277afa553cc321b1a41a508fb88abc1135b554613b37d5486886a74ba658d16a16a2b984efbe7cffc9a15331bf0d0dc6275aceb9310664a4dafee50610a3a358e002989f947de8090816cc763d747c62ef708624cc00c1a34c725433c70871f5299286d7386bac326b9bd8504d6fd83a7d1898e56fc19da85a5c5e141006eae9391104e0db3f199a7391127c9bdda6dd888220bf89e604ef91f008cea5ea0f88b3ed422d0fa16b95c20b393177c2e22f7f438bca1c2cb7fe7a4f0e43d2d3740f03b152d91af4fb77fff5dc1a2be559618538d3781a8fd09a2f8842df68277cd83b829cd142f63c0911de1ca85a5aa08a3ff40425b8515efce97080389aeeb9a9ac6d5162b665b9a7463e3af19239aef779c9e50db739bf3e537e66c98105d48d5b6c94abf7975db566dfddd6a3c80d901e9ff9a3164d712d0510c36b8e4c98ac2866760b3e49cb75669818f39a80b923f2f0636e1d09273f5b11208976ddef6e6acaee2f077c60bd8d1be24019299794172cd86e241fbc46582f20245f48e73bae39b24", 0x1000}, {&(0x7f00000001c0)="d127349dc816fc2335599ddb5c3842901a12c8c5a7c95d8b9d3a423ae62e0b59573a60f2df48b1f5b9c60b34b57faa5a98bc5e131bfc44e0f100cd3a7e79704612864ba211b9442049e6c33f64e4977a008e6aa0cd6f01b360711d8445d40be4bffd7b110cc06de7365a18aef2a961bdbf7941498e170571c430e92ab699ed8b049e00288261bfd98e9c83d4c3deb10a8992505eea90c06c0e18c92e43ff129e506a831147443bab1f2cc6868aad2d1df0729cdab747c24cfbf77ce66a159b93186aed9774441c8d2839bf092a321bd37cefb8", 0xd3}, {&(0x7f00000002c0)="f3635d0aefd4590314ecacb59ab90e90432ff2523bf3c2956ecb4c93434679898ea83ae36d0a1b82ca11f75f7bb60df216d0f1e967ce2f35cb2b", 0x3a}, {&(0x7f0000000300)="84fed35031b1358326d5a417c3219b7f8f287f1023ba", 0x16}, {&(0x7f0000000340)="87a73b268d1e60a32f4fcfd14752ee79a83c3a6d81517ae418f2fac887c2895b907b924bccb84c2ce31227f3b4dbf7124d18d530213a9f916a8b496f8be894297ce33559dddefe07fc6a616672752f3a7fedbf1b1ae02cd4610b452868b868a6cc78646d72a98ee565af9900c9c9b1b165722d698a89f01100a9e5578462a500b0ebfc1c4148efb108c9bc092fd756949bb911eeaf0d53675f5cf2caeffa38bf41f02b8b61", 0xa5}, {&(0x7f0000000400)="21222fb627ee0fd634918eb547e0d267385dd5e3dbf9a940b0cd9f07d2e49b07521eed8c05a91b86b23b0b4922ba9021b0b50968a923e2073b8059dce1496bb26ff1bba0937751c88214d182828a02a6bea6dfe271e13bba07a6378ab8d2ae8727965e070966432596ff6d46fe5edd84a4c1e84912b91f745bea37ffd304437c290c816e836b5dadc0724e647300551542df355d4c51b6534b8fa9ef43eaff465bc817e6a9ce237b57883c8c943ed0dd50ae5f1a2c7ea9e4ba294858d879f348d1a6eb372835f2e61f3dbe77f3be4ba09ea9d0e2e68d091695fded2ef7f429be80025d45c8a2e6ead5bccfbb19bd5afb71", 0xf1}], 0x7, &(0x7f0000000580)=[@mark={{0x14}}], 0x18}}, {{&(0x7f00000005c0)=@can, 0x80, &(0x7f0000000800)=[{&(0x7f0000000640)="b7fbd925ee582f7b302962d8f552e0fcbd52abc2d2b4e59b1848973ebdf7f9cae3fba428ec3fc36bf07155f6e24c8eca0db8cb30a634e059fbbcbf94486973020560260a4d1dd7147147cfe0e0f68b7fe4da52807bfb9ee74e713aa93ce1b20a3ced60b595be1b93e43f538cbc186bc65059455906bb04cabada42a4560e3369232c7fc43bf626fb2e5e4ebb516f40dc7258eb3a8de28b9d6fe4898554e99211e793d0788cf86252ca8bc27a28c66bebd17bec73aa2293aecaabf5e2002d207fa76d1af75220f597c9a9525d0b3a", 0xce}, {&(0x7f0000002e00)="f9b2918362b2888a2f3fea2eb2c69c84bddea0572e6b2e0f6996869449c971e82e5ccb62ce0a15ad9a18c55666d3dc236892820536fd1791b094c5b8eec48d366f647ff166bd9ceed9b8473da5ece1c686035c2845e14e26a138a83f66dd504e45a0a4d9d73cdfad386106feac0997f9e40e60cb6045ce08091026f3a45c3df1ff98e54c3d49637521bac001032541a7d3e928b40d89542e2e44a2e29ab695e53696a166625e2265c8db5adedb06f7ccfa75cc0b42c64eed746a63550b189b13470f8700bc5002dc77ca002a432be070eaa9b4bda1b40e20fae73043fbc87583c8cf8a7f332fed0b9d3a49a2bf2472f537bf1209aa90d9ad29887a86c1156991618d8f533c57f46aceedcf8718bb3af2de575f51f5b016fb8b85552d0ee823e9d67432ebe7d75a71fa68dde15c60b01bb651d723eb0a97aaeb6af51504c6ee09a112763c2f7e55ef0aa4dd965ed9fbb66c624b9f2f253490ac2458e5e775cec754901af126330f461bcbf62941c42218f02b8b7995a7f8f96a935c78755cfcfa416b579dc8d71636f960f3a558731339cb25873e7bb9798cd7f9af13e2ffe2935296bcdd9aa9a29cc66d019adc649990895f83e02ace4e94bbbebea76ca513b0982b1b00eb9bc20aad09b2cdc80d1dfc3a515ca5d8d0c14aac58aaf6b5c30fbac26b25af5b88027f5aa32311f6050563e47e64499bc7132c5e29f6610d8675cc3a91c5cd0d744bb4efcede88ba2b39961126c88679378653b9893f3ec7f52e92de19e442dd931ffb8510d93ebf20cfb6b94e012a4d3aa2e6337491a44d48312b082afcfab699d5429fcd6b2235846d5c2399649731c747ff4268af1762cd4cf468fee6ad51b7b064d097530bab84fa8ca6f4e8485c544278dca16040f3b3ac5175bc8e5984ab5492112fe9c34c5180658cc3718d9bdf69c7cbbe19e169e5aa839d4b17eefb18a752451e3754ffc3c66997aebe01bee9cf43d56fac68772cb3df302e385b1d0a7c87f5c2bd6ab0049ff8bef8f77b45baa3cb1ad4fc572906ff1d95209e9aee3b46e3046c5aad1cf66ae2a4eb203239b0b731c4fc86bec78beb3bfa85e4c7a7be2ddc08b907d26705527042069d07935b62c01e5323eaa1563e80a5982685d67c14fe1ebab3826aa765183c92d686f6ebb319e2b654d40635a3978644ce355a3b453f207d1651c8c03d69eb1a34a68b9046fecb1a542c389f15cfe9b3eca1ef263216ed11efc7d39dc02b4cc750db5d68b33be925c461f4ce6ed001d8dfcf20b7c53ce1ba83bda0a3ce63a24cdf79631b5540fd0745ee893b5b22780300a00bf1cf746ba95578ba659c17e5e9ea461330a854769e041fcace8b1afab1a0e535ce2fea0fcb98ee2c9945a40bbba7ce021503e71a523a33c7adffe0631696bf535cf19c2b0d7954cb3c3fca421c5e1a5367c81eddb4803dadfe8abd7860c8badbdb4c7e9fc5976322611b749a7d650f96f553e89ac66074787bb5ea9b5d0789a355660fc9d120ecf8be5278d1023dfe5598c6c057c8b06845796228836141320ff96b0ebd06c74ada0b988715ea8d69fc6d68a46817df24d73e8d78fbb0e7421bd64436cdaaa20e57713526f5b13966d8767aeb9f2c50b6bd01309e44310a2e6f7d63394cc3638381c385281e03032d09c39ef9b1735ed105d2ced68e9f479513395ef50d68297b72f7977fbbdd9a326753f111dc1bc0b846065a0415cc963cfec49579ebcaa9afa4c45b310fe2fafd3977470c8c6f0c8ba2d9eaba609a152c7957a815170415878447138ba4d4a3319fbd23bd5b45eee33a75bfdd15590a5a32fbb90d3d14097f017467216c376287a4ab1f21ed4c2d0e8fd6414ca2d3d88319127c48aa58311079187373e392d94d43472180e4c62949f2f7dce798709c2b3a9c7ccb2db276cc5fb05b0713a3937ae2c62b2f0b44c48fd5c547920cfab235282949705d70e947292aaecf7f98b87b9e7e976389f194446596f1dbbf1b3710e2ed7498a552afba5e22196c311bb70119239646efa0976ab9245b0b6ced385d684e02be76c8c42791433cb9f1c246d2255a382a0f6195621a88c68032a87e8a599a69df23cce393550631a6cc66a8f4a5b2007e9eb02b9d7e12945c0aefb11ab4ffb429c7102cac2f713c8d073f147948cf97a51c5cf29ec2e06a8b8fa474af236e318f66b0bda848d68ca5c600a01e8bdb5030ac4134d34e8c8e61d30d1c9756d4952eed863b59a8d57a4c084aa1db981df9969be58bf8bd78f9d68979512da935e44d8e5d1af58632c21f04f78af09303ba597fadef23cbe96ed467dc5e6f562f44caf4a2a7e7f1f13ae2107209482a7b11e437bde561c2de15492c86215cd1048e6134a9dd8c03b70fc3ddfd1a8da8a8aecc6156bbf534c04a9cce724dc6fb8431544db7ea727651ac71f6fa5634cad0f36bd555ec9c651ebb376ad80562a9699005d4b270ecd350afbb326c0e5700d385090c7482a09485a576d7d694177109ec4c420233ad61043ab3600e1dbadd53f8659c25e1327ffd48cb2d4fd527b2a6c4a40e46d76596595f26692ad6dc03147f0eab276803afa2daa2725d3d9ee220543bfa55f1d897a9be9e44cd0a560f9de0229df912dd329390dae61d771b324032119ab16d1040d1049daa2dabf1eacdf33f927d40556a460fd8790e52bceb4c10f86e892cf097330bda0bca64031a7551321722b037bd323dddb6e8f5235ba7c4bc3d68ce5e793552f8dc06d365a3f28572275ef3d084df9fa833792855292474db7fd7231ba58fc85e4062ed308d26b43c981147c037bde4b86ba82f7e5e144150dcbf9c16c614ed3ad02354a3e041cc1af669f6d583c52c6fd7697cf144756c2b5cbb2fe0c2aef2d6918fd7ad3a084fdcedda6cedd1bd0fa7a0986b8609e0116f2e614d7375bbb7398e7421fa82ead1d406a3a8f2ee5cda91cee7b430766cf3a3da8fbbbe0ae149a7081a51e251e39ff2eb26f36fea2c06c98df5e8bf55c3c7a832caa6414e6f219819fa96bfeac9e64e6d8d502ff0aa5c93421fdcce5f1c5d5af05026882bf7ebd6d8192cdd983b7dbc39a25c7a7d2695dee82861bad7b0a33fb8527c580c377f462857c38e40553e5fa2c9608cd6720cdc722e337d9b873f14cf4153790247fea39fbe69bb58e47ef3886efbee0414642f3a9fd14460d2f1a9df40f938b2719ff42b75f15afa70f8780ec1215ff4db5e1ac1f17f25a86fa201c4d3f5f98d9289096cf2f6259af241ce8117b063a10d4bc049df56d2326b5c9c93d84ce23f7e2e06a2f7cd3656fc4ce7c51bfdb29230f3221293d6cb6413f0a58777907b439d170cfedd3fb403fc7500175d2f4f43b057217d9d31c3eb3d2fe1f51fd3557325e066d7abb0c6124e2964cd14fc263f963b4ee7ee224966af6df49445f3e68950d0c5bd19fcdfe3df2b08815853d52b06995d3315b80ffdec7778122a7bf4243cc5d9acf27e7158b8d24139ca2fafec9d1265639f73f6ce7366d9100fd9a15dda10b6091d1f1e4a8ec7d2911097bebf121f77b1f17a550869dcec7db55f932110ef70fa9fa2ecb9b10408cb8f77b76bef4f56dd20994c01be2d36e1dc1f9b9447d43a20945723182de1c960b7a47ad92d3abd83944720490ecec0a5a43356f3696b8b233710e4f9e7a8f5aedb9883a023379aafd2762b4a984d28a76231c3c77f6bc3466637b70c312de60e7d4d13416f0def767ace83297027d2bb473ef2fe3686e8b0544b6ccb3a191cbb610da51283cd81ff4231baa624bd58c51b8771e2f6cfc9c309e9a433378474973d38e14264e29fad7249724cd78306973c165eb674ada27884f709f29cdf639f069a65212a0553cf94b2d4342060050bdf0b7d1e0d352b60fa5e5dbfb4c2d466613fca4bba6d52d6e6ec7f3aa7e8b722b799c3b5abe8f791decf12918626168fd930ddbab6eed7985b5a799d5df1bc5a47e884efea3677ada1aedaa2401dcfff4169f50ea02346695411f3ab5841b10bb431a6c1d8d0da7bed509f05c702562fa193376a5799a62bf57b70b6ea908736a8144af54018620fa02c709c43115be9c8c1269f259a2cb5c68cdf26ae33f2ba0477daa5cb7979e16da069766b3ea8e96caadfff49f7d0c807277ed828d7adf407444c2340896f79cc7888b7f30c8373c2ce19a1d519e25d99d44db723dd0beb27b97c7f5a70e07cec264d6fc2d79a63c78c5a0e0e952b40a947e347227ed483725b0e8b0191ddfe7f5bc5225e842e1907064a14595c1c1a8343c50d2da9571a5a47c91b1c802b6bd2c6d05e65b06a10768cc4ca4f091c0d49eecdff08ff38410ace54197f8f9bca17cdb331709e2a878af6d42101509a1621977d4d08192edfd9e3c6d01e572c6488725c82732ad3c1a273f1b9e04f82ccf6425908e2b47f0c8f35b4475ac79345cde13522baf35c17ae5f7f3a4496f583a9ed2e2ec979f2380964556d745fbbc00de9a40d087793aa5e7e5107e088fc0e298de977452be44d1cc39d496bd51a08d8eb2065801e85898d8be46f5ada3842eff8c320041bb3e5a48695990c9960489451e17fe50aec89393bfaec8c49e65b4b704fbd969493e1a1ba8a9195f646808b15131d603e393590186e915983901f2f3a02e9e0b64949a178e841e3231f25042777fc91a14094523b892dfdbb2d9db54513a7e16b48a627d4433977f281a00553e06ade6c9e3fdc70f07f1fd25f307ceb01d39175a90a930715e2572db094757f56320fdd808f1fa42e803e712d135007ad046b2b4d8a5a65299ca2d8e0619b08d4df2ff843593c6cef6b363160efa0477f9213774da3ff324e6a70bb449732838f6e4c997934a1fe72f690bbc910d20095fc4fb98248db054029d8ba03ea5ec893b1799b5b85e0542ef5e311000f8348a10bf608542d9dd8812488bdead96e6095063160057ca6ca25ba34384e26d474778fb2d7c4f00113e0c565052b54fbb4e7bbfc3f7eff8c81bad48865be4da709ed3bf50e33417adc3cae1bc9fc5d98b7f1f5f5632a0b17ba1abe5bc580b8fa52df9bda9d8d684dcfbbe49edd381ac402b4d57f7ccf103381e351cfa3332be8e89a02e8b2ef119beafbf210fcd1df8b410e6058bf8fb010de1c6f3e734834d83a8c83db66f7dad7e9bf4b0069dd00d9206613b5d53bc3171f2f79a6bee62a4f6808dcdf683a4e2891866ffbd2fb77bc5378ef313effd79ad45450ba0bd2652eafd198877b79521768cf904ebd1f51822e820827237a25bbccbe20795b86fa2cb8d17566f9a8eabb959c88bd7656cef1b96b5cfe521f028d1d13c5bb7e4094c69c8f5e8023980ee0fc38991aeff95c1079827f074682236f521bc14e611354e1e52c2ce6e08c9bc329cb25a9a26e9639c86f6e5a7b97c1cc5e4c9789540beb565cd7f610a949cf91ad542657bb0e1409dcd1c5a5c626c6a347bb482e8539848a14c04b6a125e70cbbd1279481523be41fb06fb4122e88029097c5575a11c00198d2bef17a1093029f820ff925d994c5b4f361e251cfb4a166117bc072e079245ecc8487efd7c62985b58a76b275feb7d2fd2e6497da716be1811a5425a027863be270a65da4892dfafb6ab7d6b9f47e485e2e075070b99f646e90d027bd070593033ed3375add58ae46961f95abc21030198006daa52e457aa00d3b91d65f615704b7fd34bf61f35dc888481ff157217560bdcf7f957390d52f2c854e3ffcc5da576d2388a8f5d28b07cf37b524c721d7497a6c842666cf0f11fae36aab2f1dfdad36576aea835994e83d454742d794ceb6309561526ef99b767895fa6e2", 0x1000}, {&(0x7f0000000740)="6c849d6ab628da840d204e59d9343972cfbc8ae912eaf286929bdf0763cbc82f37fb0a7463625d65b7971e71ffb5b70b83215241ad21eb43b77cc51215949e3beb10bbb3844819d145b59a4048cc94fac247c54e0eafe47cad274a9e5347d41832ba99398e4201ba0a22a213398eba711f7fcaf48b5871fb1ff41fc59f78817009", 0x81}], 0x3, &(0x7f0000001880)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x90}}, {{&(0x7f0000001940)=@l2={0x1f, 0x8a, @any, 0x9}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000019c0)="4422e8ee9257704c6ea1dce34086743582fae0ae9df5b3b04a2ae7d1f54f024c782aefeafd9f702c21028d79dc258d78a4aa4b37d1b796b13652ac143e529408f416db49e42cee2406ebd25182785902f25c0b0074ca1f8d267af6455b8262aebb19659e", 0x64}, {&(0x7f0000000840)="84d514bdab3b3e4d9e9c93379d9276a13530c1a9fc41", 0x16}, {&(0x7f0000001a40)="55128f0194ca9b103fce406a0e38d4271f706f0190d6e27a2790d419733bd3c4d3e055452c5a23bed96df7f5f53d6e5d9443da1473dd81bab84c7d0f80c3be13531ce5603621d324b55191fbb152b911fbc7b88f2fda42b7f8449a7398", 0x5d}, {&(0x7f0000001ac0)="c2975a09c2e63fd2d1204d61c9377ecb023b5cf127f410bfb69387835d57a82df8e07198c55705650340ab36aaae2e9b48c905c9649a630943b48be9e5bc56e58fb32ecde213a2893a2f9348ca4f0b244f7ac2f058a7f15583cc036033fa8b848e14f6ca0b1dadb6e712da30953e68071f", 0x71}], 0x4, &(0x7f0000001b80)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x81c}}, @mark={{0x14, 0x1, 0x24, 0xb352}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}], 0x78}}, {{&(0x7f0000001d00)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @local}, 0x0, 0x1, 0x1, 0x2}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003e00)="e840e4171d03152df2c274cb5e9f06b378cef410f8080ec1c4674eb037b2", 0x1e}, {&(0x7f0000003e40)="5e8ad0c9894f0dd9614b06bd59a1ce10f4efb64ecd75ac688ac69f1b6d178b618253c0709ea925709136e86afff162b9e35ed7fe5f9f56704ea61cb9d3c310d17c468cf9467560c439017650f61691514c677ef48ca367aad417ae5a583958009f6ccb60e7ff06e98fadce1c757387de403eaa713f1dbfe9a2ac2a0839b50fb22af2ca0d3c1e201b9cfb203f4770d3edaea4a79da7ec39c3f947ffbb1aaeabd724258502401091705e94e9c9af3755abf255297c9284d0e6bd0eba858a59c446cef7767d48b84223b70d14bca150bebd88b4854af0f977ca7cd02164e466afe69b42", 0xe2}], 0x2, &(0x7f0000003f80)=[@timestamping={{0x14, 0x1, 0x25, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x100}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x95}}], 0x78}}], 0x4, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r2, &(0x7f0000000100)=0xfffffffffffff674, r3, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000005380)=@IORING_OP_SENDMSG={0x9, 0x5, 0x0, r1, 0x0, &(0x7f0000005340)={0x0, 0x0, &(0x7f0000005300)=[{&(0x7f0000004140)="b0faf79f4b3eb5c5114a02ff44a6bbf542ba68205fd704ecef7ea33afc98017368a0309b204a50ac68b3ef4b837cf3e1efbf5d7f3542165cb21b720b237088f1d41449a45642827085a716098df446cc51e5cc60f90ad3ede242a31f93a468f5b1881f161ef7c38cc5234a37088100e50c2af3d1821bd5fb72abe7bc8963cd47779b149b58e8162661cfd5edfaa5a66af4e437f6b6a64eefcad9007b680c82c9bb1155b244", 0xa5}, {&(0x7f0000004200)="efbb8d3a1cfe2af20340fd734a3a1a953f248c352310d4463c120b577c01f95624424cb86b15c2be03b5e8a7c0bf1b7825f5dabd0563177db62d3975c68f51f15968727d41357d0a111221fb88369e58abba0a50983940a92dd707976044f070eef742f2d2fe4f81ffcc3e54485114b6b6d40be360c8def08ebc695bb3cb87bc60f5273b8e2cae543380554ffebde81c4125cf4bff093900efaa297b12cb632924e4716c7ecf5eebb2631eeed2939ffe8506b5d5b26b078bec2049540fc6f5c257ea95e08f4ef2b26254dd042978cfefca2fb8eb4aec5cf6e3f96898fde8467e0a", 0xe1}, {&(0x7f0000004300)="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", 0x1000}], 0x3}, 0x0, 0x40081, 0x0, {0x0, r5}}, 0x3ff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r6, &(0x7f0000000880)=""/4096, 0x1000) 10:24:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x0, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r0, r1, 0x800) syz_mount_image$ext4(&(0x7f0000000640)='ext3\x00', &(0x7f0000000680)='./file0\x00', 0xfffffffffffffffc, 0x6, &(0x7f0000001b00)=[{&(0x7f0000001e00)="f9cefceb8a23d8562a3fd1979d519496a4facc4b1b2b886595ab53666a8060069aa9838fa3fb03977055fe730e31028b20949abad59526c0169a106593568e37c5d9e5f0b36e016e028af5b654aacf747b78bec6d389761999a0746eaf899c9cb0d6945ab11732a4bb28bb06e1269b3cbbebf25af832a942be8e020adccae3b1d6be91ecdc1cd9f32d1ebcd6c44642a6d39877f5cd73c3a5e357af8f969009d967603cdc4d3185a31094904c57822592bc28d00f728e4aa1b1db2b2fd6bdf4028e951a5630213c07dd314ee89f7e6b7d4ab6971020d04e0fc0f4b2bfd42a6e71888838ac8b3114d3d035508372e9fee1c544d778f80bfa1417461c3a405f60ae08bf8140a5d28d32d012695e007d8b056686360e80f426e9161de33a6364944d65ebfbefdf37d1b91c433d8d59d6a776cd7d6f26bbca4998cb3f9ffc75214b6dd675ae5f2aab980d1b67fcc8d5c5493ba97bec474c50b052013c7281b301cb884cac1c66e6a057c6ab733f986a5773b561204974a51b371b220b79d425460543ce418c958abd5d84de604583f274596f62d2a9aa53c912171b481f4451f3d2137bf737e69bf6a17088b8bd74b5671054d7465a5776508cbfb2ed36f415b06c9826553f95b06e5ff75f4a8e29f6bb7e2fda5e35ae39d8d94b40ba0df084fab5bfd37883e3b56799f8082a7f10021667b471d8d66514ca7843d40480044e791fc930fa3fa1b838beac10f295e13998e48e93ba5575a99462f50d5dd676806c389c41d3a451d38bfa07c7575a297c0375493dcf5333e2f5c25e1de8c8d86cfa09827ffec1e9dbd11c075e42635c51b1350167570a13bd2044c1d4058ff086552e420aa666766a24a7da91d3d40fd34897708218f737916f06ec72fed9a919cb5d0e5ee4b0ec6fa8b2a871217f870528d125d868fc612ab07d731eefc6d9da81ac1f4848c35d18553815a111ff73ef21674e8c39bd0a6f110f3a10fd266dfe5103c12b6ca00c6fa8f547e76df4181ab1ed278319b038c75ab01e8662546af3da6c55ed6b4a11cb12cc0769fd90d236c6a189584b6d5056780d7c50b8b916a00befcf15aeb423969a6e89d86551d787730cdbf10109b22f03da6f883b216c9e2e9a7324ae108696e69c3f275b4575f4ecea8252d8e4c421229bbbfb79162f54eb74fdd1767cdf64f6c892946d6c3ac16bdccfc75677baf4d6e5334e7b7ca4bcb15f3dc1e897afe54b5214d33d638f6e125b94c940b4e76b900ebdf8740d37736795fd5b7e08d66f63292330af8c3380c1412a8bce0a6cb7b9417ee7111df4a95195a89b86c8260cc3bd99db1bb79c9e23bc559a358f0fadc8a739511393b274bba9b3faa8a0a4abc7d8baae4f9691c4720664e275e04627a6c417536042195e20f5bc690faf3af525de8e7fcbe546df4d4acf2797169edbde29e8508841e2c608da1c818f310947f8e996340e2d6e7eb160c71670052b74235a21770f5a6788f30b33313196ba208ffb3ab9176418281c5e74d1595c495e7031dcfa344bc970aaabbefbd6bc9a2bbb1aa3e57b891945bc9fe6d6a7db90aadd3a9d971471bab4e1340cc906f82ff2b282f625e45cb53ca140f3f7165e414448405f72a9b4e4fca6ae9c686d9288736698d514539e8a3be9b1d3ccafb1eacc32c1460bf887f92e8943c0294db7e53dd3c1a0c04a6e6ea5de52fdffa69a86465184929e6b0b3ef1cd66c6fc01acf93454a3390c262366fa0c2b2ccbf2e03214b1b44ab987f9af5c2180644892614fefda4f3639d2e847412f45cd256571daea7398fd7d45a4c0c78c6c9217ebf52ef413f3cbfa4ffc31032d5766563e9aa11a5632f9935b7b2bbf81728c33b77d75d4696b428e6b277418751a8f4de1695e15d0ad819c0e8258f295714ce01c6b275b2b779bda8b078290113403096926131338376b5b9e922924348bb5948acb722b19661203e8ebf92ec0bc260ed3b82733cd220b314651fae3d71464a1079df528e08867bbb81fa9d0e72901754d32b3aa0e21944f2b82f275afe7824a488e16e195c455b4773349640a580b17a007abbb2307101c3cef2a20051b13e697567fd1996658d002fa7a504c613007b0e8188a42129cae1a5d96ce900a86aad3c950953dd5e4f946bb79709d4c0c3353fe19093158364857c79298d7d8e154ee8c7d9da80c741835e143e483e207c8a6faa2f79b4c45df8d0171ecace0510ff7e34668f311e0492aec3f9dc5e5540113fda51c9981bea3d08585940e32839ffc1b5f83f45f2c4d825461a63c6499e3f6ba47058514c8241c6ecd8b6b2eb5933a726e0bfccf6c79890c10db85fca2269ab64095853add215d4f73ec39f4ee58a48ed9b62e07dc22965e7917424be6befd51fc655abd829c07828f547ca525d731e75d6fc4b10610d844c8ae1595bd2a26d938f31b325c6a2532e72a991722110fd0fa5d3e192cf578f22bcb60f8132a44d99ac712f9d80184e7f721ffe9ca9e9a395b7e221827ef4ca499807f63d6365cbe95825784e0dd813fea03b45d765aea383cedcad11880b6c66c70ebd4d787ef74d3cf223aabdf2473d3104b4ade0874a02ef79ad5596b02f4fc7d18d8ac44f029f7f81d3dca6843da48611e2a2ee76363ec7f6bcfba918b18c6b5dadc57e910d606d21cf1dd72f2431ced13cf7b84d824ae5af9500e17204d71fbe2d185f42edc8dc43ef563c8f4b5cb924d122f59a40f8aa900c7c94948d268e907c941cfc203a3a964b0a4eaa4ef510e898e2b022a25ad27ddf5970ea48913a1887fae8efe45fa96a72f0da4a30269fd3aca2a48f6980551592e3544551e60a8e7c025f6ca3703c780494b734673d503e0c49a1bc739027b5079b491212eb7de4a005e18d04ee36a9fb76753723e19486702ae1fc472a02a47ad385810cba4f45cbf75176196f45ff4daee5570e1e6728cffba6fde6e466c357a0baeda9fc420727c528ef18c2b710a368373c999c28c879f83800d40bf35cd01371124bc4be5ae2b5d81e57c6c1dd8a11712591eb09e8dbc3146768e74aedf900a12543527a0cf1a97227f7b1b4aa73f2f9c1992391edb34e17cd7744480d51f3f8db434529177a2134256492b232bbf6a9acece67771b8b683deb2186980991fd263f05958e72227222bd712b333ba519b37c72157ecf3d13e9006c50f66613a997b1b3ddeff9ddf1c4fe362d8b8c374f9394c90b9a9cd518ca84a3ed31cf5c6be1d2c08b184ec783986cc49f5c39d316bc13b08233836fd890ff2ebda81ca6c73f983aed2ede242dd4f9fd65bb5da4175e8af8f53e0c7fd184e75cf4337921d066479cac466b9f2aff49793658650d7c8f95d1c0c3093c1aecc74d0b4d893226cf17621942f05ed5df3ea2c316b9addfb9500ec0ff43248547ba226937eff122ced8c68f9c72654320ba495d96e98a6f2f86274673ebae230bc3ad73b61f00aa3290151052f68778d1a5cf6c62bea0888267fd9671bba58976a543c997f2e651f6b29583415373747814f1f4a38ae604f0695bf3a85deea64b476ccb25834abd3a01ee6df750543241c58d318eecc9dc9e4c7d452b01283696d488e02e5355819865fdb21263dda5dacd284d52e1734610d124ce14a67acaadbe1aeb7c51d1e1ba4627520ab332fdd7d5fac564d7294a6a42023728f9096c236cff4fbfea93e86d7deaa0ddfe32759cbbeb24747dc49516da1d9f8d0b05baf2394bf486d21a9f9dbe4caf0ac46754eb3aabb7aa05f086980e30ab81459e7e9a51dfcd0bc4f106f084f5031cbfb93ce7deae825e12dd4692afbe381b9b2dd4218e01b69211f43849ce4b47b8ef3d3d1498ee1f7deda37474cb53a298f17a08851265053963f6b1ac3eb2e3459d19266ff31161a2380af8aa15633310fd84b9eb06889fd33394f9582691fcc3c2f51125c663b67364b3e6d6cc3b0c482c31d109b60a0d06ae2b5691d39f0ebdcd156b8de000ac0bedbef04f66cc74cd9dcb1b90fc54c156e3df9a861566b24136189c871eea4d27226b845e2c5ba52148c71cfe4325f12b7881c0fc1e20f23105eace6b5a9a8adbf739267d3688843db317fcf93fa91df3d0e8a668d66535ed558e9d27b6d9a72e59e8d7b24e4080337a9df75419f853d351cc301ed3fc5e8aa572727897b79a2aafdb4f91e87a330f9b903d2343d2e2fb80e2448e2e5c04a3bbc52d1e9ac55a1c9f8d84cd1b8e0e50f50a2a0462a33ca9b013728bd7e59592f7c6594628d57bbee743af02baffb2266a2361e1915d4951935ad8d070a4ffa57641a47435631e885da3c37f806c04e771e600d5d33a19d6740fe576ecdd8d03d0a40276d9226ccca736adbe8e6910ca63568c10d0a9979ff23eb5a2e4ea0dc74112442f81f0f74b3de7cf03e2090f1030dd63e3f4ea0fd172e0a6864c9953f6767a09e28b74b4def4541f0d79644cf4593b81a2f43bc8dd3178d28b7ae89be81a58f2ca228dfcff6717f8778ca579db681f3c5b41a256f9ff3ba31ddaa04b34667874cc4fde5c2bfd9b3773210b2557931296df77e77684be9848cd7b89583241112cf90e68465fc015f81fabcde910a875b767698f4c2c363f2b421aca99d3b84af565b0194e419a36ab81bb8266da307560ab26f5e140b0ee3334f7be1c72dfa60a3f8f14bb5b2fdaed878fa8bf9bd34b633375ebf52f7d96ec91cac825f424aefa99c3f3b8067ae883b0ca8e757e7dd82a14dbde5cd0c258e2ec7171afaee38ac57f22324ccfa9eae9ca0617fb0b4bfafd4ab721c32be03640f694decdd20542032a47ab5d748458b773c159e27f274784bfec997b62094be5f2ac87221909c4c961a2a047b69c21c73957efb638b335e9ee1ee3e4e0de019d0edd3ee7b0f405a75a458fc978648499cf7980c193fb8276b7f2410ad4acbe975694133c2a42617df17a01c36dbee4167f5500c60b493e0b6ca32b5b1648667dcf84e1bb3e9f469d6e4010bea5150ef279839bfe1370af9f0f5d03ed9f0eca557f7e1a0c0b4da3edf863c020911c007f1cae2acdb7031dca4e11720f3c3d74681ce4944c7a610069fef8cf0795bd01630720d9191bfe4fb35c3c009c681aed735a955f216c44d71f52ea579d4413715a9deb249819d1446b57dc6b83df2a82bb596e06bd714df06e32aed5aa21cea3b6c06299c53fb80617d7646081d1836acfa3504e5db3242abe5ee259652298b709745cbc51857095d5990b3a3f39f551c4ab2365b6f84bf7656ade162f21c8ae047f18ed4e188d57e99b4555603c580a0ae669cc76380e0464012ca61ffe29cbcb10bae0079666c304712c42dff4e590709168f0e8e1643c082dfa9f2ac32e41dd0a75febd235edba1df10960abde1b82bcc19ced0658be47cefeeb92feb3b453e768aa372a01ee38265dfd945df2a65cdfba6065c0fc92f17d8b657d1d052359314eacea4f4f01967d28e45fc3ed5e8437ed2b9add166f3b463768a41369ec66e2fddfb3a52e2a5834548cc974d3247a6525b079678bfdc83fb6b98c6b3ba170a4a022ea190bcb123e41ea40527b7bb358188888deaedb29fdaca1c67fcba071a9932c5ccdb8b4e3f9a3c3e2a277b7aa37be50b6b35103615f8cc5709e924de1ccac31f7102f249421c8ca2420f5808a4995de5bf535a90813046a2c9e5940f7dcb404c4c9d8092c4519aa809284a0ebe7798dcf9115a2f25a71273f97b16adcac8801e299c174d2a2711de8009c4cc50bb485caeb1290535e76eda0f6e427b88a54cdb61cbe7029c6f30f88edba9d39cd289c6cdb5029bd4fc66a34704c440e423fb6d12a64ed49c", 0x1000, 0xfffffffffffffffb}, {&(0x7f00000006c0)="18f5a50c43", 0x5, 0x4}, {&(0x7f0000001880)="114cc761c61ad1cc1d8105021167632a5001f345ec4aea0788f5d09ee606695eb34eb163547c29bf9996892a946d7bd503272234eede4ea9039125b01cb3253ac2281bc3565aa2a38b39a10fdbdb678481e92d62b0f9543211b2aba12af2da823d99d6188f9f7e243c797b8df2634f37346bdf388ad18090bff2617cf1f236c310b30ec90732232477597168e590c8744c4f64b3ce1a9dff70c83ef1a6ab00caa2e054821a34ea626aa730c930e151adeecddb58ed2e371674947cb8093e40ff48b8c94b68a897753c0812a07a3ccf1668794c62f272c21370d04c03c9164ff7b7a775e356b2915d347906", 0xeb}, {&(0x7f0000001980)="4c13e44e76e25601965b2fd59c5a13da7a17b2c96b1edc6c973eed0accca78937a95ea365802fef4f0cb964e65963f6acf8fbc8a256c78357ec04c4888181bac0a5bd93988c9ae62e1ec3e4b2739bb361ebc8343991cf9f83e61af640faa6c99960f0873097fee0585661d9d2348575d3fac34a614b736f1e9f68a27b4853f28739735f7e418fd76f98b2a03f14c762a3ab973114c7116469a95f85d7acce88f528fc00d122af94c3202f8c42e546afee694e6798abe07d92de4d527451c83cf68259f1f72a0bc289587eb3ad1cde9a51b", 0xd1, 0x9}, {&(0x7f00000007c0)="44ab804f57505c62a94e68ebcfcd8a42e71d05b4ab78f718a23ebe609403949e9e711f7841c565ed7c33aca2b7639ead1f7439c2aeda5ffc526b3c8165c30d7e1375db399968aacf23d7c663f27054c3db714e5c4c47521edf56f7b51e5a9f6d25e95a72f8383212f4965d728dc140759c2108510cc9fd3ea8776e80875c656967f45a5882f73ed32cc3c9c67e27a3a1dc8b4cc1b1d60c33", 0x98, 0x10001}, {&(0x7f0000001a80)="e9906d9f178d44a72ab3bc9ce4551df753543e7666e994a59d56ce8d6d4391e475602e2a13806408896276a2722133fac0cfba8696903eeaf4324b47b439d52799877aad5cb61af73ac6f82c366031cb086613c11b35126fe74adc98ed2eaf8be5be1fa6b00674779c9d5f2c", 0x6c, 0x4}], 0x20, &(0x7f0000001bc0)={[{@lazytime}, {@acl}, {@init_itable}, {@nojournal_checksum}, {@journal_checksum}], [{@uid_eq={'uid', 0x3d, r0}}, {@smackfsdef={'smackfsdef', 0x3d, 'uid>'}}, {@uid_lt={'uid<', 0xee01}}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB="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"]) mknodat$null(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xe301, 0x103) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x5, 0x2, &(0x7f0000000600)=[{&(0x7f00000004c0)="02b58903bb12d47f97e42cd076d4484322f921bc45a9ecb8ed4e1f409169cd47b49146ffc58856c31ca20b72f40986bf106d2f3c37e9a273d889cd86fc8d6711946a0211bff3a368cbc742b8cf470023931ca630b6ae913af36c2615c7e2c6a32b274e9534ce49fd01121a6a4b551ac56fd603e75b5162b87031f2ac71b613615b9c42509239e78bfdac21b8d830a3a820cdce5092da9f24fba7ea18c57072df4b6920", 0xa3, 0x8}, {&(0x7f0000000580)="dfa89286a1a22fc42ada9ca2b681e7988f8cb0fbeb1867edf53e281a00877b2e8cd0d5239f6fa6282eade3d565c525d0804bfedef91b9a025b390edda263c859e972949817c4a1fbd1adbe98b3fdc7e4c13ad8cfa094e2a8b80e39dddba19b5b3753552d", 0x64, 0x8be2}], 0x2, &(0x7f0000000740)={[], [{@dont_measure}, {@appraise}, {@hash}, {@subj_role={'subj_role', 0x3d, '9p\x00'}}, {@appraise}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@uid_gt}]}) [ 1833.673018] loop3: detected capacity change from 0 to 135266304 [ 1833.704313] loop7: detected capacity change from 0 to 135266304 10:24:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0xfb0, 0x0, &(0x7f0000000180), 0x400, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x95}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x32, 0x35, 0x25]}}, {}, {@huge_advise}], [{@dont_appraise}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1833.771193] loop7: detected capacity change from 0 to 71168 [ 1833.776197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.778738] print_req_error: 758 callbacks suppressed [ 1833.778772] blk_update_request: I/O error, dev sr0, sector 7 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 10:24:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5e8f}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1833.813721] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.814594] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 1833.814862] blk_update_request: I/O error, dev sr0, sector 263 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1833.838715] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.839969] blk_update_request: I/O error, dev sr0, sector 519 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1833.867100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.868711] blk_update_request: I/O error, dev sr0, sector 775 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 10:24:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040)={0x2, 0x9, 0x8}, 0xc) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:24:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x0, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1833.897854] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.898977] blk_update_request: I/O error, dev sr0, sector 1031 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1833.910173] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.911652] blk_update_request: I/O error, dev sr0, sector 1287 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1833.913706] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.914800] blk_update_request: I/O error, dev sr0, sector 1543 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 10:24:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @multicast1}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x4) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000140)='./file1\x00', 0x40) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff7fffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000001e00)=""/4089, 0xffffffffffffff27) 10:24:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000480), 0x121100, 0x0) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000140)=""/98, &(0x7f0000000040)=0x62) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) [ 1833.935865] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.936943] blk_update_request: I/O error, dev sr0, sector 1799 op 0x1:(WRITE) flags 0x0 phys_seg 32 prio class 0 [ 1833.947914] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.948939] blk_update_request: I/O error, dev sr0, sector 2055 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1833.950894] loop3: detected capacity change from 0 to 135266304 10:24:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r1, r2, 0x800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {r1, 0xffffffffffffffff}}, './file0\x00'}) mount$9p_rdma(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x22010, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}]}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x500, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x5, 0x810, r4, 0x9dd2e000) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000002c0)) 10:24:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1833.976680] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1833.977765] blk_update_request: I/O error, dev sr0, sector 2311 op 0x1:(WRITE) flags 0x4000 phys_seg 32 prio class 0 [ 1834.007148] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.009693] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.025866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.034173] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.035791] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.048957] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.061861] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.063778] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.072746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.078905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.080723] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.087785] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.089011] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.093843] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.097874] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.099824] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.101600] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.103198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.108035] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.111813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.113107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.114807] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.116660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.118900] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.121138] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.123031] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.125026] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.126894] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.128141] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.130767] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.132740] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.134243] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.136277] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.138154] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.139753] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.141573] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.142735] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.144812] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.147128] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.148774] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.150724] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.153223] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.155186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.157267] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.158775] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.160866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.162713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.164727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.166779] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.168650] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.171729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.173273] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.174729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.176804] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.179143] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.181023] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.182949] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.185098] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.188773] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.190841] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.191986] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.195013] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.196909] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.198708] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.200258] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.202126] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.203759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.206066] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.207733] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.209760] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.211666] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.213197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.214952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.216892] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.218743] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.220652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.221792] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.223968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.225713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.227222] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.229145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.230725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.232274] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.234131] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.235615] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.237228] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.239219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.241151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.242946] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.244914] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.246958] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.248880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.250033] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.251759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.254226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.255981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.257895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.259759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.261448] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.262977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.264186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.265814] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.267692] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.272269] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.274173] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.276135] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.279788] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.281565] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.282747] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.284970] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.287120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.288958] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.290711] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.292684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.294195] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.300668] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.301896] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.304965] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.309753] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.311286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.313702] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.315269] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.317205] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.321789] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.322938] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.327273] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.329218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.333767] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.335651] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.337174] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.341852] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.344003] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.345152] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.349887] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.351811] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.353694] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.355267] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.357233] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.359005] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.360727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.361866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.363711] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.365264] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.367170] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.368755] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.370275] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.372149] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.373726] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.374857] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.376742] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.378616] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.380203] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.382034] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.384091] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.385741] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.387261] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.388754] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.390702] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.392282] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.394153] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.395750] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.397684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.401705] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.403227] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.404783] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.406954] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.408714] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.410240] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.412168] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.413719] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.415230] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.417140] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.418282] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.420197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.421960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.423780] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.425565] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.427210] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.429144] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.430785] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.431905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.433728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.435283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.437202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.438819] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.440708] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.442648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.444208] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.445738] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.447598] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.449167] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.450737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.452234] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.454128] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.455763] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.457689] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.458859] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.460735] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.462300] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.464148] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.465737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.467233] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.468939] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.470585] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.471432] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.472467] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.473275] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.474185] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.475023] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.475996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.476879] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.477744] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.478568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.479733] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.480689] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.481575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.482403] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.483193] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.484042] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.484874] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.485689] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.486590] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.487569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.488840] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.492280] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.493718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.494918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.496460] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.497270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.519079] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.520264] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.521195] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.522129] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.524686] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.525516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.526389] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.527166] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.528093] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.528934] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.529761] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.530590] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.531418] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.532262] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.533087] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.533901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.534889] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.535743] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.536569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.537394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.538189] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.539035] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.539867] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.540704] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.541612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.542456] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.543249] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.544096] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.544957] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.545785] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.546618] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.547428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.548338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.549145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.550001] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.550912] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.551811] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.552681] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.553508] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.554290] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.555198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.557878] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.563284] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.564331] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.565127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.566035] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.566884] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.567718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.568664] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.569500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.570292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.571114] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.571946] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.572778] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.573628] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.574493] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.575402] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.576282] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.577291] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.578154] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.578977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.581555] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.584793] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.585601] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.586489] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.587291] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.588272] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.589099] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.589958] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.590787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.591668] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.592495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.593395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.594204] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.595032] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.595895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.596731] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.597688] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.598520] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.599302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.600243] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.601106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.601921] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.603682] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.605500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.606294] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.607246] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.608117] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.609025] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.609865] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.610690] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.611531] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.612491] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.613606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.614729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.615697] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.616607] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.617448] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.618265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.619118] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.619963] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.620789] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.621618] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.622429] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.623484] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.624364] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.625195] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.626675] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.627500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.628338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.629142] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.629985] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.630887] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.631786] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.632615] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.633441] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.634232] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.635055] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.635893] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.636726] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.637673] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.638510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.639332] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.640219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.643505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.644453] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.645245] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.646060] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.646971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.647842] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.648713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.649537] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.650366] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.651168] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.653187] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.655458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.656403] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.657212] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.658040] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.658875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.659805] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.660631] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.661472] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.662250] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1834.663067] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1847.951846] hpet: Lost 1 RTC interrupts 10:24:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x10) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000200)={{0x87, @dev={0xac, 0x14, 0x14, 0x14}, 0x4e23, 0x3, 'lblcr\x00', 0x0, 0x10001, 0x5e}, {@local, 0x4e23, 0x3, 0x0, 0xffff, 0x6}}, 0x44) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/318, @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'vlan0\x00', 0x2}, 0x18) r1 = accept4$inet6(r0, &(0x7f0000000140), &(0x7f0000000200)=0x1c, 0x800) syncfs(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) recvmmsg$unix(r2, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) faccessat(r2, &(0x7f0000000040)='./file0\x00', 0x102) 10:24:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000100)=0xfffffffffffff674, r1, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000001e00)={0x11c0, r2, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_WOL_MODES={0x11ac, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xb4, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'proc\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa575}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'proc\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'proc\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\xbf:(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_BITS={0x44, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '.@}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xac, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+.{{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '^[\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '+$\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, ',^\']!]^&}%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'proc\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'proc\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'proc\x00'}]}]}]}]}, 0x11c0}, 0x1, 0x0, 0x0, 0x4810}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) r4 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'geneve0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x6, @local}, 0x10) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x1a0, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x9c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x8020}, 0x4000041) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r6, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_io_uring_setup(0x49c6, &(0x7f00000001c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000), &(0x7f00000002c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r1, &(0x7f0000000100)=0xfffffffffffff674, r2, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f00003d6000/0x400000)=nil, 0x400000, 0x0, 0x10, r1, 0x8000000) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x228000, 0x11) copy_file_range(r4, &(0x7f0000000100)=0xfffffffffffff674, r5, 0x0, 0x0, 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x0, 0x131) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000300)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x1, &(0x7f0000000240)=[{&(0x7f0000000540)="2553466c099118cfc25021d5bb73d4af3bb364d716d30ca41046eb904905eb28ce65df81e7261fd420c3afd99b2f891c81ca3ad8b18228f592612d61e4c20cc526201297e4b5a4311eb8670f063533ca9d72", 0x52, 0x7}], 0x2400, &(0x7f0000001880)=ANY=[@ANYBLOB, @ANYRESHEX=0x0, @ANYBLOB="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"]) 10:24:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x63, 0x0, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x660001, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) getdents64(r0, &(0x7f0000001e00)=""/4096, 0x1000) [ 1848.707582] loop3: detected capacity change from 0 to 135266304 10:24:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x2b060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = openat$cgroup_pressure(r0, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000140)={'veth1_to_hsr\x00', &(0x7f0000000040)=@ethtool_channels={0x3d, 0xfffffffb, 0x80, 0x6, 0x4, 0x5, 0x20, 0x4, 0x10001}}) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c636163687e30c74821660eb5e08344b8ed40653d6c6f6f73652c6e6f6465766d61702c66756e633d4be486ead66f83408f5452414d46535f434845434b2c7375626a5f747970653d5b2d2b2e412b5c2d2e2c657569643d966d21a7ac9b027250279ed0133d5681f46ae96092ecf5e9246c79eea2a53b869fb48e1e3678133decd618f5e4c60e39fd4509fbf66868f7fe686d80c7612b2f97b7b19be4f0e3cd16ce1b0d11a12c2c747ae6f01ee5c4ad872dc5cad96ece25b82163a704188c40e8f0f495d87baa56929283ee39b3ecdf93ff8e6a054c03438f58a09cd405e96f639ef859a199d7c5248b1f596aef0d8753712584bab9a8e32abe7121581715c52fdf1648b008f2ca5eb29d18a7cc5893f4b1c4e938760803eec5d7134dff11a8eed5b2647260584b90a1913e053f36e384a80aa6", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x0, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) r1 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="670700001b0000000036e24b37cac1e3d21bd5bdb1ea1f932202e2bd199cc66c21c7dc08b16635657c6d7911995531ef2bc907440370f5d8aab7dcb567770f1e4bc484503b7482bd4e5db031e49103ab4c9df89dfc987182e9b694bafd"], 0x40) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85", 0x3}], 0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x80000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) copy_file_range(r6, &(0x7f0000000100)=0xfffffffffffff674, r7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, r7, 0x80, &(0x7f0000000140)=@nfc_llcp={0x27, 0x1, 0x0, 0x6, 0x69, 0x6, "40a376ecac2e61cc184d8a9c999abdd76da9ff0daccb92a975556a4983323829da8de047be1bdedaa8cdec8fe5bb584f3168db652936b4e043502c011ae99c", 0xf}}, 0x7fff) 10:24:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) fallocate(r2, 0x2, 0x5, 0x7) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x82000, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e733d756e69782c6e6f6465766d89702c63616368653d702c63616368653d4fa66948194a1e3045f422c16c6f6f73652c7375626a5f726f6c653d70726f63002c646f6e745f18817072616973652c00"]) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x80010, 0xffffffffffffffff, 0x8000000) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001e0001000000000000000400fe8800000000000000000000000000010000000000000000ac14140969030cbadd65cdf4a275c20e1d87bb000000000000000000000000000000000000000008000c0000000000"], 0x48}}, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r1, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) r2 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x14, 0x0, {0x0, r3}}, 0x8) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) [ 1848.892181] loop3: detected capacity change from 0 to 135266304 [ 1848.907045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 10:24:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000200)={0x5, {{0x2, 0x4e23, @rand_addr=0x1}}, {{0x2, 0x4e21, @broadcast}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000001880)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB='./file0\x00']) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0xfffffffffffff8d3, 0x4, &(0x7f0000000600)=[{&(0x7f0000000280)="a4051e8a8e9224c09a717b2ea9068d9df26364ef3339859171f88e17a5c0e00febb2eb5afbe61949b4f1beae58df942181a85574584eb0cc816087450e4743917e0f1759efe6afc6f5243a20505c", 0x4e, 0x8}, {&(0x7f0000000300)="4e82853efa094a26582bd2a84936e325495708206efa054811717eaee2577b529b71f2864ad44a77c7ed62561bf3e527a864a64213146c2fd7394db07664ca720537b2e27647e320f4b8e98a173b1c58b752282ee8eaf969538bf627fcd466bdb54b51ad9a96870bdb63c264e9cc050822d8adef53ff3d0c232eabbee0a322cd9cd972d5682dc7166ff3883e33a2b93a0f704823301380d47d057c60280e1d7b4508c83dc4598b4e5d5e887488a0d8ffd1f1def79c1e89a7b9648d87ca20401b3e85c5b1f5cf64be6362b361434478c87c0186c22ea168868252bd673e1dcb35b67b2d0edb94a3af8da97e30f5d8a7ce6d1d", 0xf2, 0xffff}, {&(0x7f0000000400)="035cc994d31401ce83f21ae0d50e396b0ec2ba4c3a217f3b9aecb31b32aea5a738237f35aafa2a74508927dacdd3a2d34095902c2ed4ea8aa11656fc14f177f24c25a85d2487f50a4069120d82114e9a2894fe02194ef0f4cbf3c0c8afc4990d82f1c4a22eced1257a1f8d827d603957303d4823c47fc6f98202663c5f66b9b7484d8537279107d419501620585aab8d80ec73365afea6f45d3c88e8bc4b28b1052d04a5b3af856a30745c21e84dba6cd5f0f305bb278acff5a5d53302acc04c5ab202d2f12e9a56baba77dec7fdd83dd4a3819625e87a4befd6c4e848e095831cd906f0833da8dfc1f3a624ae", 0xed, 0x7fff}, {&(0x7f0000000500)="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", 0xfb, 0x7fff}], 0x60000, &(0x7f00000006c0)={[{@uni_xlateno}, {@uni_xlateno}, {@shortname_winnt}, {@shortname_win95}], [{@obj_user={'obj_user', 0x3d, 'icmp\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'icmp\x00'}}, {@subj_type={'subj_type', 0x3d, 'proc\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'proc\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@smackfsdef}, {@fowner_eq={'fowner', 0x3d, r2}}, {@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xe7.T,['}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000140)=0x1e) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) 10:24:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet6(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="2747d6610a6e40076dcd8f2fa38179a9f717c63c281d377631bec66b3d77e413fec721e68eef864a50be87bd04fd0fd1872e5d3511c4426f67fd5929053dcad28df92c36234273aef72e7f1a672ce12272b5767c3f0a3cd35d0e65bfe8c9fa1f743edc636f809893d5a84d2e345ef3603185294bb8de782e7da6a4420091622128d8f8b501f15931ca44c9841a36e599938f0d28f24a9cf52fa5106dd7a7098b389ab32f498975aa66cf028a00e74d3531c1f5b2a7197eff81", 0xb9}, {&(0x7f0000000200)="c80e40a11be1dda0166c40b5d016f532355eece6207752897b349da25a705edc02a784ef82ace056fff30e2afc1f96d408a9abc211c5895d67e37b03b9df03aef7", 0x41}, {&(0x7f0000000040)="324380d9a4619e58eb2530c189ccbb5b91f952020296b237a3a55bb545f93f", 0x1f}, {&(0x7f0000000280)="20a7716bd5bcf5f90a2db2894e05eb53a4ddaae088bf0c63e964a2b011f3e09266af82e9cbeb2d8ed279bd3e279c716ea74672eda77139a23ecf3299b08866f5e1417dba3dc071cd2b9b5bd7a075df182633bf01f8e76a6b54a47833038fc029ef5024f850972d845ae3c33175d3f517c7e0ed40c7bf507891619b70bda854dbb66bacf0d00208a901b9db0ec2249df79fa3c2f404035b8beeee18121690b15f503e54f54041038679", 0xa9}, {&(0x7f0000001e00)="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", 0x1000}], 0x5}, 0x20005000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1848.987825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1849.004048] loop2: detected capacity change from 0 to 135266304 [ 1849.046861] loop2: detected capacity change from 0 to 135266304 [ 1849.351956] hpet: Lost 1 RTC interrupts [ 1853.959920] hpet: Lost 1 RTC interrupts [ 1857.583826] hpet: Lost 2 RTC interrupts [ 1858.915912] hpet: Lost 2 RTC interrupts 10:24:50 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x0, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x301000, 0x184) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000180)={0x8, 'syz_tun\x00', {'wlan1\x00'}, 0x17}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) open(&(0x7f0000000040)='./file0\x00', 0x204000, 0x40) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 1: timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) pipe(&(0x7f0000000100)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000002, &(0x7f00000001c0)) finit_module(r1, &(0x7f0000000040)='proc\x00', 0x3) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdd7ea8f0df72c3b) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="02100200", @ANYRES16=0x0, @ANYBLOB="200025bd7000fbdbdf250400000008000400fc2fd50008000500050000000c00018008000500040000001c0002800800030001000000080004000300000005000d0000000000"], 0x4c}, 0x1, 0x0, 0x0, 0xc840}, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000240)={'filter\x00', 0x0, [0x5, 0x6, 0x200, 0xb9a, 0x6]}, &(0x7f00000002c0)=0x54) 10:24:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB='LZaskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x201, 0x1) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',maskEND,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x40000, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) [ 1863.860724] loop3: detected capacity change from 0 to 135266304 10:24:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000140)='./file1\x00', 0x9b, 0x0, &(0x7f0000000180), 0x10, &(0x7f00000001c0)={[{@fat=@dos1xfloppy}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'cp861'}}], [{@fsmagic={'fsmagic', 0x3d, 0x16149882}}, {@subj_user={'subj_user', 0x3d, 'proc\x00'}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x2c, 0x0, 0x1025808, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000016c0)={0x0, {{0x2, 0x4e23, @local}}, {{0x2, 0x0, @dev}}}, 0x108) mkdirat(0xffffffffffffffff, &(0x7f0000001d00)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0/file0\x00', 0x80, 0xa0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x802000, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',\x00']) r0 = openat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x200802, 0x89, 0x1d}, 0x18) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000300)='./file1\x00', 0x9, 0x5, &(0x7f0000001880)=[{&(0x7f00000003c0)="eb71eeea7f8f6ea490233c230241edc43ae7184a59eee4493cca2ed0f2faa149bab47efacef0f995ccbc0f74f63caf6c539fa58ac6055569769c2d5cc285e6dd790766a7c17af75c29c19fa4aaf99a7f292f5b7832632b55e7c9802b5f346d3315f82c5b64b42748d4999d5b18c4306d6de65ae34f962f58d4b1564fdefeca171519b1adc2e7dedec7df58e46bc8936bf4085190027fc6fa3a4ee92ae17b85201077d7814a2c4d26a28a6a37c0259043e8c3e0f57d65a0cc2f745e54ad2ecf5019354c0587fe7305721330d69fcc3970cbb62ea3ce2ea3bf230edc46b09152", 0xdf, 0x1}, {&(0x7f0000000680)="3034278fe055b806b4c317838cc2ca84b39d20ec287e6b83c2f33a2b0984540a1197a482a896b05eaf1943d2a8dbed72ac4621df5d3fd9098273e493f455823bd0a275906f017533fdd27dd3e556e7bda02ae76ce7dbf50c240c3564a06e23d3750fb852a7cb4edea2fbe9f569080ef92d0bdf42e1bff6118a2649680c4ed44373cde0d4f879ebc256c5c900dcd6", 0x8e, 0x200}, {&(0x7f00000004c0)="314f797374f5dbe59086ff89fccd499a60bc66064e659dd88a8ff12d83ff1eaab06ea084ba03", 0x26, 0x9}, {&(0x7f0000000740)="feeb92cf507483b9bfa3ee98d71126b72ad8eca2c17ac6f3f6e44bda317c1de1c6dd6d281aed263b19cdf06448dba1aab98dca4dc0c4d757d85bcc8ba23dbf9241b520f224e4014549b99b32793bdbfdf132307af4f206e7f92788bd270036378c297ae31fc2b092f1851e1464da8560b697f424eb773f0216568d7a16a5495f3e9386391b38c66e598152a13d0f42031aa2c2b42410dc48490aceaa91d73180381c3c1b178fbf6b0de1401977a0fbaa", 0xb0, 0x8}, {&(0x7f0000000800)="d8dfe9987c9ebd2e1b66e400e4d6c40d61b2663db88caf970fa5ea748c0c107948faabc78a5843a5e3818620d59ea21918febce13af9fd9bb75990ce813d366e6cf62617d0e7b8b2cc27a918452f98cfdf32350f745c6239ccdc5e1fff02666daf15245816e1abaac412439c", 0x6c, 0x2}], 0x3005000, &(0x7f0000001900)={[{@cruft}, {@check_strict}, {@nocompress}, {@utf8}], [{@uid_gt}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0xfd, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x80010, 0xffffffffffffffff, 0x8000000) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) openat(r0, &(0x7f0000001940)='./file0/file0/file0\x00', 0x32b340, 0x93) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001e0001000000000000000400fe8800000000000000000000000000010000000000000000ac14140969030cbadd65cdf4a275c20e1d87bb000000000000000000000000000000000000000008000c0000000000"], 0x48}}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000140)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r2, &(0x7f0000000080)=0x80, &(0x7f00000000c0)=@sco={0x1f, @fixed}}, 0x8) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1, r3}}, 0x219) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x10209, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r0, &(0x7f0000000880)=""/4096, 0x1000) openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x240040, 0x12, 0x8}, 0x18) 10:24:50 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="bdde03bda9d0910e7c90ebfb08eff4afb2d271c5448473c60c8ad0ca1bd277584499fe6898d582433e062decb3013e553abf225a55177fac0d8548e7ea74cfbe50384b24d98923c055ced9045a4620c26d845c8ff03f8495268966b8ebac5af863bd5ee64a6ddeeefbea253c0181d423119b033bfd4050404a493c7f48dd8f5f4a9a268477f9", 0x86, 0x100000001}, {&(0x7f0000000400)="eb2a9b6e2524c040eea3c52c2c7e3cccfb6586ba459ad4057f45e78b051a8744df3d5038aa38aa1a7db0408815c17c0df207f053d7b5e35b3ad09f4ae3b9aba34d862f6b9dfbb5df9fe11d34599d5b9d569cd782990b5c28789b9bebcef3ec62aae18928454a4170a4e61d092ac937e3c95abf41863c37c21eab1adbee84157fdb1d2cd4e805279d1ad5e2f9200fe473c6c6aa0f18de7af97464df6346040ac3e7636d1095d5b97d2fdf40787d1352d15292904017c53e771299026e6d54646272638bbfebd867a75938680cc6da723c04887bbd59d5fa3a7afd8e816420592c22598fecf6", 0xe5, 0x6}, {&(0x7f0000000680)="3c0b1c8ee5c53dc778b6e3316f260ef6c3ad0ea869cd18bfdea5daa0b38d7929da3aa5ccbd66d4f101b7a8aece58a9122f6f0e946dc18911d99f05c312069858b189d541ecc2680eaacb90c13043e0209f5d718400bc65a3f0ef5cafb4cec5500ecdf122ab5074f542b148b5f048d0f2e7be10bbf6a12c7814d7119b5e5c2044f5759fe0c7832ba280c2d39433bf610c156a660be9b3c922df7f95d85cf5d2dfc8f37b4f32c7fdc0d3e01f3786383fc55215985af337639f", 0xb8, 0x1}], 0x100d000, &(0x7f0000000740)={[{}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0xbc872c8a00000}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x81}}, {@block_validity}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x0, 0x31, 0x34, 0x4a770120140a1f7d, 0x63, 0x32], 0x2d, [0x66, 0x36, 0x63, 0x63], 0x2d, [0x36, 0x34, 0x61, 0x32], 0x2d, [0x37, 0x63, 0x61, 0x36], 0x2d, [0x63, 0x59, 0x63, 0x61, 0x37, 0x0, 0x62, 0x32]}}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r1, &(0x7f0000000880)=""/4096, 0x1000) 10:24:50 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x5408}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r1, r0, 0x0) openat(r1, &(0x7f0000000080)='./file1\x00', 0x111802, 0x100) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000001c0)=0xffffff00) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000280)=""/104, &(0x7f0000000300)=0x68) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x4, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x10, 0x81, 0x40, 0xe0, 0x0, 0x400, 0x490c, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x8108, 0x4, 0x7, 0x7, 0x3, 0x81, 0x3, 0x0, 0x79800000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r3, 0x8) getdents64(r4, &(0x7f0000000880)=""/4096, 0x1000) [ 1864.062749] loop3: detected capacity change from 0 to 135266304 10:24:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000016c0)={0xffffffff, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x0, @dev}}}, 0x108) openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x2800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xb}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000040)) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) [ 1864.084820] loop7: detected capacity change from 0 to 1024 [ 1864.104920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. 10:24:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0xfe4c, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='binder\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x200000000005, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) io_setup(0x283, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) recvmmsg$unix(r1, &(0x7f0000000000), 0x0, 0x40000102, &(0x7f00000001c0)) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f0000001e00)={{r1}, "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"}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000140)={@empty, @dev={0xac, 0x14, 0x14, 0x1e}, @multicast2}, 0xc) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x6, 0x4090013, r0, 0x10000000) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) getdents64(r3, &(0x7f0000000880)=""/4096, 0x1000) [ 1864.132987] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. 10:24:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x400, 0x0) r1 = signalfd(r0, &(0x7f0000000800)={[0x2]}, 0x8) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000840)={0x4, 0x10001}) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r3, r4, 0x800) mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x800, &(0x7f0000001880)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@nodevmap}, {@version_L}, {@access_uid={'access', 0x3d, r3}}, {@aname={'aname', 0x3d, '((:.6!'}}], [{@permit_directio}]}}) mount$9p_unix(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2004, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="2cf79f10127eb9f3c600"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000003c0)={0x1, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e21, @broadcast}}}, 0x108) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff80}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x51) statx(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1000, 0x500, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', r6, r7, 0x800) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001940)=ANY=[@ANYBLOB="010008000000bfaf7564da4964ea9e4189810000008c00000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r8, @ANYBLOB='./file0\x00']) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000200)="0e7e17018deb252618704d4b4859e64da17c39d2a86706ef3c6ffe7a57a9714ddf5d215952d3947282c8020334cadab2863e802de108f035160b4a4a8f9d0c25a628366b1e04a95b499445a6bce0c95293bcbc3652b202a651c849ef4da6aac85e9cfd784cf7b1df3ad37b2545feb373ff5ca4a96c944a2709dd6e261c3642c9f2f01cbd45cfcc58b564e6e6e65f97585cf1", 0x92, 0x10000}], 0xa030, &(0x7f0000000300)=ANY=[@ANYBLOB="75a77f34", @ANYRESHEX=0xee01, @ANYBLOB=',huge=within_size,mpol=interleave=relative:9852812529,gid=', @ANYRESHEX=r7, @ANYBLOB="2c6673757569643d38343032346435312d633437642d5f3562342d32a130632d30306231663033612c00"]) getdents64(r5, &(0x7f0000000880)=""/4096, 0x1000) [ 1880.536223] hpet: Lost 1 RTC interrupts [ 2086.119611] hpet: Lost 1 RTC interrupts [ 2103.115698] hpet: Lost 1 RTC interrupts [ 2104.960455] hpet: Lost 1 RTC interrupts VM DIAGNOSIS: 10:29:54 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffffffff86bfe240 RCX=ffffffff8132019a RDX=1ffffffff0d7fc5f RSI=ffffffff813201ae RDI=ffffffff86bfe2f8 RBP=0000000000000000 RSP=ffff88806ce09c98 R8 =0000000000000000 R9 =ffffffff8686e6a7 R10=0000000000000001 R11=0000000000000001 R12=7fffffffffffffff R13=003b9aca00000000 R14=ffffffff84e887c0 R15=0000000000000000 RIP=ffffffff81319e9b RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000056316f2ec678 CR3=000000001afc8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000414cf0e800000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000007 RBX=ffffffff8567993c RCX=ffffffff812755a8 RDX=0000000000000000 RSI=0000000000000008 RDI=ffff888008978944 RBP=1ffff11001130f91 RSP=ffff888008987c70 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=ffffffff84e0f1c8 R13=0000000000000004 R14=ffff888008978000 R15=000000000079980e RIP=ffffffff81275651 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe2400000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fbcec2a9e40 CR3=000000001afc8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=004c02fe016c6c6f502e726567616e61 XMM02=00000000000000003fde666666666666 XMM03=00000000000000003fde666666666666 XMM04=00000000000000003fdadd48280a4afe XMM05=000000c00010e1b0000000c00010e180 XMM06=00000000000000003fd3333333333333 XMM07=00000000000000003fd0000000000000 XMM08=00000000000000003f552e8845918800 XMM09=0000000000000000bfde5137de20d4de XMM10=00000000000000003f999999999999a0 XMM11=000000c00010e1b0000000c00010e180 XMM12=000000c00010e210000000c00010e1e0 XMM13=000000c00010e270000000c00010e240 XMM14=000000c00010e2d0000000c00010e2a0 XMM15=000000c000110420000000c00010e300